General

  • Target

    fa678b54bc6dc42ca74ab104203475fe_JaffaCakes118

  • Size

    951KB

  • Sample

    241218-gw5rmsxqbm

  • MD5

    fa678b54bc6dc42ca74ab104203475fe

  • SHA1

    151df3753808b3d44b5a5255c820c8b928658c1c

  • SHA256

    38e98d7bea3c4297e939f8940dc3c2855caecea427156dbe001ea43d03d4a947

  • SHA512

    e893d49a446900fbfda12b1a2540a478132db22214fa849e3d95b7b6b8be6783a4e116e614fcde7afe731323492963219aec0cbd21797905ecea74af5b142af2

  • SSDEEP

    24576:SUFa7K4Jy/fVtktVGPrfO/WxvaXUTcLHFpSYiVtktVGPrfO/WX:jqMlSyfO/WxyXukHFISyfO/W

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      fa678b54bc6dc42ca74ab104203475fe_JaffaCakes118

    • Size

      951KB

    • MD5

      fa678b54bc6dc42ca74ab104203475fe

    • SHA1

      151df3753808b3d44b5a5255c820c8b928658c1c

    • SHA256

      38e98d7bea3c4297e939f8940dc3c2855caecea427156dbe001ea43d03d4a947

    • SHA512

      e893d49a446900fbfda12b1a2540a478132db22214fa849e3d95b7b6b8be6783a4e116e614fcde7afe731323492963219aec0cbd21797905ecea74af5b142af2

    • SSDEEP

      24576:SUFa7K4Jy/fVtktVGPrfO/WxvaXUTcLHFpSYiVtktVGPrfO/WX:jqMlSyfO/WxyXukHFISyfO/W

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks