General

  • Target

    f6e0c25936a6fe1f2dfd7c0c2a6cfb40_JaffaCakes118

  • Size

    97KB

  • Sample

    241216-cya8layrgv

  • MD5

    f6e0c25936a6fe1f2dfd7c0c2a6cfb40

  • SHA1

    3daef183f32d9c054721a319a7530c0980115f8c

  • SHA256

    829549b3cc3c3798a7b34395b1914c1bfc095e960445e8a858068b95e3579fd8

  • SHA512

    a4b5d01b6d2f122984b642d30ef540b6ae6134500af10d0e4f52c116b0fc8b94b38e0c994eba9abe17b85d650387b6e2ee9d5a944a9708cfd2ae423434550e14

  • SSDEEP

    3072:nYP2Z7o3LiW9C2Tk3RjjgLjMel1KxSCXo1:nY8o7iWdTk3GjZf4Seo1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f6e0c25936a6fe1f2dfd7c0c2a6cfb40_JaffaCakes118

    • Size

      97KB

    • MD5

      f6e0c25936a6fe1f2dfd7c0c2a6cfb40

    • SHA1

      3daef183f32d9c054721a319a7530c0980115f8c

    • SHA256

      829549b3cc3c3798a7b34395b1914c1bfc095e960445e8a858068b95e3579fd8

    • SHA512

      a4b5d01b6d2f122984b642d30ef540b6ae6134500af10d0e4f52c116b0fc8b94b38e0c994eba9abe17b85d650387b6e2ee9d5a944a9708cfd2ae423434550e14

    • SSDEEP

      3072:nYP2Z7o3LiW9C2Tk3RjjgLjMel1KxSCXo1:nY8o7iWdTk3GjZf4Seo1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks