General

  • Target

    fb4c4cc32a4a1ffe0c6cf1add4ec0c2c_JaffaCakes118

  • Size

    168KB

  • Sample

    241218-m79gvswncv

  • MD5

    fb4c4cc32a4a1ffe0c6cf1add4ec0c2c

  • SHA1

    82fc0483208df05dfb1aee96c7692dd18037e825

  • SHA256

    f4e5b9a368d3cb31f356fca6a38370815835b63fa11d20fb0359a31ac81eb942

  • SHA512

    ad9a0189771d19932b1a0d4d8ab3c418cdd0102739e131157cf759e56b8839e33760d16fa02e2f2cb7317af22dfd8a1aace6de9e8e0725e3a1e83eceecc2917b

  • SSDEEP

    3072:MNQKPWDy/I00zJltZrpRARGi0dKA7jE4IgUmxh7pf8wQfFgMo:MNSDy/I/3thp3TdvdIg97tqeMo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      fb4c4cc32a4a1ffe0c6cf1add4ec0c2c_JaffaCakes118

    • Size

      168KB

    • MD5

      fb4c4cc32a4a1ffe0c6cf1add4ec0c2c

    • SHA1

      82fc0483208df05dfb1aee96c7692dd18037e825

    • SHA256

      f4e5b9a368d3cb31f356fca6a38370815835b63fa11d20fb0359a31ac81eb942

    • SHA512

      ad9a0189771d19932b1a0d4d8ab3c418cdd0102739e131157cf759e56b8839e33760d16fa02e2f2cb7317af22dfd8a1aace6de9e8e0725e3a1e83eceecc2917b

    • SSDEEP

      3072:MNQKPWDy/I00zJltZrpRARGi0dKA7jE4IgUmxh7pf8wQfFgMo:MNSDy/I/3thp3TdvdIg97tqeMo

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks