General

  • Target

    e3ad8a73b356b00321fc5c544c56be8f_JaffaCakes118

  • Size

    126KB

  • Sample

    241211-3gdv9swrgl

  • MD5

    e3ad8a73b356b00321fc5c544c56be8f

  • SHA1

    8cbb8d02d8d107c30e0d23a5596f9a949b64d12b

  • SHA256

    796b38004553a2bfd9f278ba492fc48e52d5b875e5b9f07a34f4dbd8ce86ba4f

  • SHA512

    06251fa7a7e3bc2169c64ec5157694955c43f9e880c3493e1e71b33822d5c57979b3cd1b397d4f2e9f3c239a2ce376755ce6db8440542937c7fe402f52210477

  • SSDEEP

    3072:8OAK95OsZkkvOfgd5D5PrxRWoY6OogMid:8OZg7GOfcZ5NR1nvv0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      e3ad8a73b356b00321fc5c544c56be8f_JaffaCakes118

    • Size

      126KB

    • MD5

      e3ad8a73b356b00321fc5c544c56be8f

    • SHA1

      8cbb8d02d8d107c30e0d23a5596f9a949b64d12b

    • SHA256

      796b38004553a2bfd9f278ba492fc48e52d5b875e5b9f07a34f4dbd8ce86ba4f

    • SHA512

      06251fa7a7e3bc2169c64ec5157694955c43f9e880c3493e1e71b33822d5c57979b3cd1b397d4f2e9f3c239a2ce376755ce6db8440542937c7fe402f52210477

    • SSDEEP

      3072:8OAK95OsZkkvOfgd5D5PrxRWoY6OogMid:8OZg7GOfcZ5NR1nvv0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks