General

  • Target

    e5c5bf8c972a348457423451beec4895_JaffaCakes118

  • Size

    120KB

  • Sample

    241212-ll6neazmas

  • MD5

    e5c5bf8c972a348457423451beec4895

  • SHA1

    5ac90136aa63fee1a492233fc9876ed4021bc51e

  • SHA256

    0b37361ab33f4f47df4293bce275871b62192a383276a016347bdc3733aedb04

  • SHA512

    6a388818df375879db959e0742399c2ef296b7ce565ffd6886ae06d51bc2a74e8b77d1c9c6ac8bcbc8a75e96e00d069add199a7c5ce84920f8bb35d9b746ea62

  • SSDEEP

    1536:F5UQkVwu3gZqgrEdpeuaygr/A2UnereFn0Nc2zVjCkxrC:F5HkauQU7dpehygZqe1Nc03O

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e5c5bf8c972a348457423451beec4895_JaffaCakes118

    • Size

      120KB

    • MD5

      e5c5bf8c972a348457423451beec4895

    • SHA1

      5ac90136aa63fee1a492233fc9876ed4021bc51e

    • SHA256

      0b37361ab33f4f47df4293bce275871b62192a383276a016347bdc3733aedb04

    • SHA512

      6a388818df375879db959e0742399c2ef296b7ce565ffd6886ae06d51bc2a74e8b77d1c9c6ac8bcbc8a75e96e00d069add199a7c5ce84920f8bb35d9b746ea62

    • SSDEEP

      1536:F5UQkVwu3gZqgrEdpeuaygr/A2UnereFn0Nc2zVjCkxrC:F5HkauQU7dpehygZqe1Nc03O

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks