General

  • Target

    f78fd22cca5eb1981456b18aa0b22dd8_JaffaCakes118

  • Size

    120KB

  • Sample

    241216-gcfcmsyjak

  • MD5

    f78fd22cca5eb1981456b18aa0b22dd8

  • SHA1

    8bd3279df80d1cc5397863eaa62be83762619a00

  • SHA256

    dbdfdd4adb882e115325419274b67ee5f63f0afaa9f39228cc8a845c11163c57

  • SHA512

    8d1435b17a704e93ce2a0e16f93574dee7f1cec4abc64aa13d3f76a29bf1a115ede4853c79e7b4f407b40f05e2ba71d8200a6d837e4244b3e2889bad24538e61

  • SSDEEP

    3072:gJisS2mU/yYaD+YP/WZZesKO75DrPgSxajOAS1QuttA:OFmmy+Y2ZZesBZPgSxanS68O

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f78fd22cca5eb1981456b18aa0b22dd8_JaffaCakes118

    • Size

      120KB

    • MD5

      f78fd22cca5eb1981456b18aa0b22dd8

    • SHA1

      8bd3279df80d1cc5397863eaa62be83762619a00

    • SHA256

      dbdfdd4adb882e115325419274b67ee5f63f0afaa9f39228cc8a845c11163c57

    • SHA512

      8d1435b17a704e93ce2a0e16f93574dee7f1cec4abc64aa13d3f76a29bf1a115ede4853c79e7b4f407b40f05e2ba71d8200a6d837e4244b3e2889bad24538e61

    • SSDEEP

      3072:gJisS2mU/yYaD+YP/WZZesKO75DrPgSxajOAS1QuttA:OFmmy+Y2ZZesBZPgSxanS68O

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks