General

  • Target

    f141d95f050fc4581c8661df64539d76_JaffaCakes118

  • Size

    120KB

  • Sample

    241214-3n3g7sxpev

  • MD5

    f141d95f050fc4581c8661df64539d76

  • SHA1

    019a50f80ae9cc9a535226a1aed5c13ac2f76c05

  • SHA256

    e0a556d7144fff4cff0366901441197e6b02ddf7a5ca02f80fafde1cd8990f87

  • SHA512

    d17553b5f041d50d8cbf891cca2323181d257c335f4e93b05999da4903f0b6815adf78a10bb197c5525ff5ae4378fc7265746332725ea3fda69f628d8cbd516c

  • SSDEEP

    3072:UTxBqc9P5UzF9jq5Y6tAlpQPGVxCEgu14EE:iBV9By3q5YSrPGVguZE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f141d95f050fc4581c8661df64539d76_JaffaCakes118

    • Size

      120KB

    • MD5

      f141d95f050fc4581c8661df64539d76

    • SHA1

      019a50f80ae9cc9a535226a1aed5c13ac2f76c05

    • SHA256

      e0a556d7144fff4cff0366901441197e6b02ddf7a5ca02f80fafde1cd8990f87

    • SHA512

      d17553b5f041d50d8cbf891cca2323181d257c335f4e93b05999da4903f0b6815adf78a10bb197c5525ff5ae4378fc7265746332725ea3fda69f628d8cbd516c

    • SSDEEP

      3072:UTxBqc9P5UzF9jq5Y6tAlpQPGVxCEgu14EE:iBV9By3q5YSrPGVguZE

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks