General

  • Target

    f8e4401dff213d69435c8a4c95a5deea_JaffaCakes118

  • Size

    369KB

  • Sample

    241216-n253xszjd1

  • MD5

    f8e4401dff213d69435c8a4c95a5deea

  • SHA1

    ac46f81e1385154221a02174c2a284eb858cf48b

  • SHA256

    ceba6ad4b778705c6fc2a4a968b93c5da232a3c545cf0e62bacc624c7f674b5c

  • SHA512

    6c815cd96e88749c1753187d3c433388e6086fb653f7b8c827e7d371426dba4b3667419651417589ebc9e72b40e85c9d58608ed65c1abe756c316ed83cfa7156

  • SSDEEP

    6144:3v3+5MVSBtJ/M7Ikc3TFarEwxhJyyQaAt6REgdfSVzQtYMhNufkF8UWYXMrj2L:/0OSR01P47wdt9YMhaAXMryL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      f8e4401dff213d69435c8a4c95a5deea_JaffaCakes118

    • Size

      369KB

    • MD5

      f8e4401dff213d69435c8a4c95a5deea

    • SHA1

      ac46f81e1385154221a02174c2a284eb858cf48b

    • SHA256

      ceba6ad4b778705c6fc2a4a968b93c5da232a3c545cf0e62bacc624c7f674b5c

    • SHA512

      6c815cd96e88749c1753187d3c433388e6086fb653f7b8c827e7d371426dba4b3667419651417589ebc9e72b40e85c9d58608ed65c1abe756c316ed83cfa7156

    • SSDEEP

      6144:3v3+5MVSBtJ/M7Ikc3TFarEwxhJyyQaAt6REgdfSVzQtYMhNufkF8UWYXMrj2L:/0OSR01P47wdt9YMhaAXMryL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks