General

  • Target

    de272f947d82a6e07356f1a6e4ba96d3_JaffaCakes118

  • Size

    100KB

  • Sample

    241210-xc6slatmcz

  • MD5

    de272f947d82a6e07356f1a6e4ba96d3

  • SHA1

    d0c2e26865c2d064ae11d8a54088833828af51bc

  • SHA256

    afb5e3c466dbb9a96486cac1659c8202db6d0e55ff81858e25ab7ea39e79e259

  • SHA512

    25e66c5de5ea4e672523de4f5735c65e17a7265c77bcc89c22924bbe8095178f0b2c0741c9d652d58cef939e0b19b548c61e46d7f8258e153f779c6de31be2e2

  • SSDEEP

    1536:9UKCF0WFy+rsXWxRMHM6CR+sVwIw50rlfcU6M/kWqce0sW646jcEz:CKAFy+rNxGHM60+VGrlfca/6ce+6

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      de272f947d82a6e07356f1a6e4ba96d3_JaffaCakes118

    • Size

      100KB

    • MD5

      de272f947d82a6e07356f1a6e4ba96d3

    • SHA1

      d0c2e26865c2d064ae11d8a54088833828af51bc

    • SHA256

      afb5e3c466dbb9a96486cac1659c8202db6d0e55ff81858e25ab7ea39e79e259

    • SHA512

      25e66c5de5ea4e672523de4f5735c65e17a7265c77bcc89c22924bbe8095178f0b2c0741c9d652d58cef939e0b19b548c61e46d7f8258e153f779c6de31be2e2

    • SSDEEP

      1536:9UKCF0WFy+rsXWxRMHM6CR+sVwIw50rlfcU6M/kWqce0sW646jcEz:CKAFy+rNxGHM60+VGrlfca/6ce+6

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks