General

  • Target

    e61308014c2a81f465e1cc8970279605_JaffaCakes118

  • Size

    778KB

  • Sample

    241212-m5sfka1rcx

  • MD5

    e61308014c2a81f465e1cc8970279605

  • SHA1

    8f11360ef89d989c79a40612b4be15b052a86542

  • SHA256

    62ca5b06b2a98eb0deb6b3f4ba8017d2145af90155e3cff476f198b16ba5baff

  • SHA512

    63593916648942dd11673b8de55840ab182c664e7217e346b4ac1dfd89d56aebbece8d1e74691509c68b542d931a356d3a4bad767328e394d9a8ef4018cf706c

  • SSDEEP

    12288:C3TdtLW5WIj1YSSdFx9GTiQOZZvBSXyMzBUWb9lx/9AgHLo8OW+rB:cDsj1dENX5JBcJ9nPx/igrp+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e61308014c2a81f465e1cc8970279605_JaffaCakes118

    • Size

      778KB

    • MD5

      e61308014c2a81f465e1cc8970279605

    • SHA1

      8f11360ef89d989c79a40612b4be15b052a86542

    • SHA256

      62ca5b06b2a98eb0deb6b3f4ba8017d2145af90155e3cff476f198b16ba5baff

    • SHA512

      63593916648942dd11673b8de55840ab182c664e7217e346b4ac1dfd89d56aebbece8d1e74691509c68b542d931a356d3a4bad767328e394d9a8ef4018cf706c

    • SSDEEP

      12288:C3TdtLW5WIj1YSSdFx9GTiQOZZvBSXyMzBUWb9lx/9AgHLo8OW+rB:cDsj1dENX5JBcJ9nPx/igrp+

    • Ardamax

      A keylogger first seen in 2013.

    • Ardamax family

    • Ardamax main executable

    • Modifies WinLogon for persistence

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks