General

  • Target

    JaffaCakes118_000a63fae7fd9ad90fdd048be6dd2301

  • Size

    127KB

  • Sample

    241231-b6jz2azrbz

  • MD5

    000a63fae7fd9ad90fdd048be6dd2301

  • SHA1

    fee97bbb043225d177033fd909e92c3d3b05b36d

  • SHA256

    cbffcc511024deedaab62620af9adea61a040a95347f9995a54989e16d240958

  • SHA512

    41ff48c47b7e52ad0504edb6a1b2b2fc145af798c97a20c8b4fecc3372c5cd6bf311b9d318e021566ca50e8de3f8fe0ca590e5251744c637c1048b029c3a4abb

  • SSDEEP

    3072:5JtkJHfxmAwRK/ltPlAlR4qE5e2Nd9BCPJ/PXzjLE3nE:GJpmAzNtdAlRzEUiCPZf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_000a63fae7fd9ad90fdd048be6dd2301

    • Size

      127KB

    • MD5

      000a63fae7fd9ad90fdd048be6dd2301

    • SHA1

      fee97bbb043225d177033fd909e92c3d3b05b36d

    • SHA256

      cbffcc511024deedaab62620af9adea61a040a95347f9995a54989e16d240958

    • SHA512

      41ff48c47b7e52ad0504edb6a1b2b2fc145af798c97a20c8b4fecc3372c5cd6bf311b9d318e021566ca50e8de3f8fe0ca590e5251744c637c1048b029c3a4abb

    • SSDEEP

      3072:5JtkJHfxmAwRK/ltPlAlR4qE5e2Nd9BCPJ/PXzjLE3nE:GJpmAzNtdAlRzEUiCPZf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks