General

  • Target

    e2cbf9000b835f507de38f609f92f0c8_JaffaCakes118

  • Size

    120KB

  • Sample

    241211-xnn2xsvkf1

  • MD5

    e2cbf9000b835f507de38f609f92f0c8

  • SHA1

    4032307f228e4400500919cb4e370ae9368b755e

  • SHA256

    b944ff4dd1284ae2e435c5ccd2d2e6a8057c80a2944355498222cebb71039751

  • SHA512

    1d03db8c31de9b8db9689ee7939e1227151ece10dc9472dc2984e89b29f228247165e2ef3f380e021727ebda51532d8310f2901ff47b7663616b49f4b8b527e8

  • SSDEEP

    1536:ho++LFl2ROkabkGuJpxRUknff2drzJ0ZlO1hC5o0vGgbUipfPuBG9HVZGqOXd:4BlfkabkHJpx+E3umHOvCxOgXpVZGz

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e2cbf9000b835f507de38f609f92f0c8_JaffaCakes118

    • Size

      120KB

    • MD5

      e2cbf9000b835f507de38f609f92f0c8

    • SHA1

      4032307f228e4400500919cb4e370ae9368b755e

    • SHA256

      b944ff4dd1284ae2e435c5ccd2d2e6a8057c80a2944355498222cebb71039751

    • SHA512

      1d03db8c31de9b8db9689ee7939e1227151ece10dc9472dc2984e89b29f228247165e2ef3f380e021727ebda51532d8310f2901ff47b7663616b49f4b8b527e8

    • SSDEEP

      1536:ho++LFl2ROkabkGuJpxRUknff2drzJ0ZlO1hC5o0vGgbUipfPuBG9HVZGqOXd:4BlfkabkHJpx+E3umHOvCxOgXpVZGz

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks