General

  • Target

    f28fcc7e1a94aa1cc97222897553972d_JaffaCakes118

  • Size

    100KB

  • Sample

    241215-gfaxbsxlhl

  • MD5

    f28fcc7e1a94aa1cc97222897553972d

  • SHA1

    2d5bfa7a0e203544d98e1a93de686a33cbd719fd

  • SHA256

    cbf9b5c02572c50a7923cadaa51436e87cec342daf1e7fb3540d6e88b947c90c

  • SHA512

    1f7d87f91b227a9b13edf426fe9404d17709b67702c28d700becc7c37ddbc45b53d12436b80737463a0e968dd9c12535036e7eb7a877a24f12f5bd5efcd7a25a

  • SSDEEP

    1536:o6kPkYLISYlPFzqqPyChWQpR6eBfKsSkU0nuzeWEIPzHMe:AgSk1qqLWa6emktKtEgL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      f28fcc7e1a94aa1cc97222897553972d_JaffaCakes118

    • Size

      100KB

    • MD5

      f28fcc7e1a94aa1cc97222897553972d

    • SHA1

      2d5bfa7a0e203544d98e1a93de686a33cbd719fd

    • SHA256

      cbf9b5c02572c50a7923cadaa51436e87cec342daf1e7fb3540d6e88b947c90c

    • SHA512

      1f7d87f91b227a9b13edf426fe9404d17709b67702c28d700becc7c37ddbc45b53d12436b80737463a0e968dd9c12535036e7eb7a877a24f12f5bd5efcd7a25a

    • SSDEEP

      1536:o6kPkYLISYlPFzqqPyChWQpR6eBfKsSkU0nuzeWEIPzHMe:AgSk1qqLWa6emktKtEgL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks