General

  • Target

    e9273df577a0b2960737f23d57721932_JaffaCakes118

  • Size

    195KB

  • Sample

    241213-bjag3svqen

  • MD5

    e9273df577a0b2960737f23d57721932

  • SHA1

    8a0cd0439c7a2ad32858d79c54ee2a8afdc4e9f6

  • SHA256

    872fab6a6ec7293d4444822b21929ef9ec4c2bade1b4ab9e58621cf0f19062a6

  • SHA512

    3ecdcecaceb5f7f4c5fec9a654e2b96ee5a86e0c6c87aacb6c4da22bf860246099f6ff028ffc31a5d1fb19f4e22343ab1042a853c23352a81fa818ff33208b64

  • SSDEEP

    3072:nNe6Q7+/AZmRvD2gy8YmOD+rKD/HqAFL2zV30IITxq6vj5B0SINwY:g6pNy8S+rKDfrFCd0Ixu5B0SIN/

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e9273df577a0b2960737f23d57721932_JaffaCakes118

    • Size

      195KB

    • MD5

      e9273df577a0b2960737f23d57721932

    • SHA1

      8a0cd0439c7a2ad32858d79c54ee2a8afdc4e9f6

    • SHA256

      872fab6a6ec7293d4444822b21929ef9ec4c2bade1b4ab9e58621cf0f19062a6

    • SHA512

      3ecdcecaceb5f7f4c5fec9a654e2b96ee5a86e0c6c87aacb6c4da22bf860246099f6ff028ffc31a5d1fb19f4e22343ab1042a853c23352a81fa818ff33208b64

    • SSDEEP

      3072:nNe6Q7+/AZmRvD2gy8YmOD+rKD/HqAFL2zV30IITxq6vj5B0SINwY:g6pNy8S+rKDfrFCd0Ixu5B0SIN/

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks