General

  • Target

    f6e8f9d7a0070efe255713135f9c06c6_JaffaCakes118

  • Size

    100KB

  • Sample

    241216-c3erkszkgy

  • MD5

    f6e8f9d7a0070efe255713135f9c06c6

  • SHA1

    1a637951bc3013bbd5e80db46ab6940f96318680

  • SHA256

    df9403f540001aba1d31fe34d69128d2ba0580716ac80964a066d25a439ddd4a

  • SHA512

    c64589b1fafb072e668bf1921441190f26d8dc5aa48a7f36b7c8f54acc4c6bdda8cd00533ac5f94679ad188b5b0da4d3ff1704ab23c050c37b7c9e0ae3c046db

  • SSDEEP

    1536:3nRWP4CqRXu2DES4IiEbYaeYHgYLSWP1+kYI13Rq7V:3n+XKu2DEXIjFSg6I1Bm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      f6e8f9d7a0070efe255713135f9c06c6_JaffaCakes118

    • Size

      100KB

    • MD5

      f6e8f9d7a0070efe255713135f9c06c6

    • SHA1

      1a637951bc3013bbd5e80db46ab6940f96318680

    • SHA256

      df9403f540001aba1d31fe34d69128d2ba0580716ac80964a066d25a439ddd4a

    • SHA512

      c64589b1fafb072e668bf1921441190f26d8dc5aa48a7f36b7c8f54acc4c6bdda8cd00533ac5f94679ad188b5b0da4d3ff1704ab23c050c37b7c9e0ae3c046db

    • SSDEEP

      1536:3nRWP4CqRXu2DES4IiEbYaeYHgYLSWP1+kYI13Rq7V:3n+XKu2DEXIjFSg6I1Bm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks