General

  • Target

    e5717edaf052f2516fe07f189edd66b8_JaffaCakes118

  • Size

    95KB

  • Sample

    241212-jz9wwazpdm

  • MD5

    e5717edaf052f2516fe07f189edd66b8

  • SHA1

    2811f9182c38446aa637e55f57bcad187b451e81

  • SHA256

    c4b7414f27118709ae8e78323eb9dbb8dac794b18309c4bf5c234850dc0378d2

  • SHA512

    d35c6a57af88afd4732170ee1bb40b7e7e94c336fa476644f979b8ea969badd4f36b21d6c7afef40a4ed30e39531e2c14e6a2b305e0e4de5a9e4b5aed011117b

  • SSDEEP

    1536:oR77zzocQqrasi7pleNRIBm+A6zpeQYvF1BVQokOItAyCEtEIIUxt9S6j:+7z/Ysi7ple/I0sEt1BVDICy8Uxys

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e5717edaf052f2516fe07f189edd66b8_JaffaCakes118

    • Size

      95KB

    • MD5

      e5717edaf052f2516fe07f189edd66b8

    • SHA1

      2811f9182c38446aa637e55f57bcad187b451e81

    • SHA256

      c4b7414f27118709ae8e78323eb9dbb8dac794b18309c4bf5c234850dc0378d2

    • SHA512

      d35c6a57af88afd4732170ee1bb40b7e7e94c336fa476644f979b8ea969badd4f36b21d6c7afef40a4ed30e39531e2c14e6a2b305e0e4de5a9e4b5aed011117b

    • SSDEEP

      1536:oR77zzocQqrasi7pleNRIBm+A6zpeQYvF1BVQokOItAyCEtEIIUxt9S6j:+7z/Ysi7ple/I0sEt1BVDICy8Uxys

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks