General

  • Target

    f2632bd49f37cdf681b187438e4f6173_JaffaCakes118

  • Size

    3.2MB

  • Sample

    241215-fhvh3svkdx

  • MD5

    f2632bd49f37cdf681b187438e4f6173

  • SHA1

    13b11925bc8f7c0a3f76eca2d70fe06b44e3e245

  • SHA256

    11f71273e6d5522c3551ab840e062442de9328ed2b2117b98ab3adb80f7cc822

  • SHA512

    08b2d1b400fd625cd997b3046db49189563419ef4ae9c47bfb28ee9a622d51450bd01613f8f549a88fa7bf4229c476b1e18369fe2088956dc00de0ad530347ef

  • SSDEEP

    49152:ghPg95YC1yRr5R+jzA66ymAu1Rg48D9d5VGoemcYVeGaY0uWV355FXw/+fuWV35j:EgXt1yRr8zA6POvwga

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f2632bd49f37cdf681b187438e4f6173_JaffaCakes118

    • Size

      3.2MB

    • MD5

      f2632bd49f37cdf681b187438e4f6173

    • SHA1

      13b11925bc8f7c0a3f76eca2d70fe06b44e3e245

    • SHA256

      11f71273e6d5522c3551ab840e062442de9328ed2b2117b98ab3adb80f7cc822

    • SHA512

      08b2d1b400fd625cd997b3046db49189563419ef4ae9c47bfb28ee9a622d51450bd01613f8f549a88fa7bf4229c476b1e18369fe2088956dc00de0ad530347ef

    • SSDEEP

      49152:ghPg95YC1yRr5R+jzA66ymAu1Rg48D9d5VGoemcYVeGaY0uWV355FXw/+fuWV35j:EgXt1yRr8zA6POvwga

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Deletes itself

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks