General

  • Target

    JaffaCakes118_004aa6d9ffd050af3d8a10aa98f1b630

  • Size

    136KB

  • Sample

    241231-cc635s1lbx

  • MD5

    004aa6d9ffd050af3d8a10aa98f1b630

  • SHA1

    0e276266572896d197b9777432c97987cef8a8db

  • SHA256

    5f9312302e32bb6d0f04351e11e31335ef62aaf4015951b459168930ed26b005

  • SHA512

    926b6967f7670b5efc3666a3537c2bb84466c707ce97e7de4dea3109916670d3ab30e89ee8cae74c823981713fe71e5e76d027524d0a8225897b82fdf330d4b6

  • SSDEEP

    3072:Szsh2AAvD/uEDtc6u0UJ7KSAF8KEiEiX2+4kJ/:Se2AE/W6cK1Qx+4e

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      JaffaCakes118_004aa6d9ffd050af3d8a10aa98f1b630

    • Size

      136KB

    • MD5

      004aa6d9ffd050af3d8a10aa98f1b630

    • SHA1

      0e276266572896d197b9777432c97987cef8a8db

    • SHA256

      5f9312302e32bb6d0f04351e11e31335ef62aaf4015951b459168930ed26b005

    • SHA512

      926b6967f7670b5efc3666a3537c2bb84466c707ce97e7de4dea3109916670d3ab30e89ee8cae74c823981713fe71e5e76d027524d0a8225897b82fdf330d4b6

    • SSDEEP

      3072:Szsh2AAvD/uEDtc6u0UJ7KSAF8KEiEiX2+4kJ/:Se2AE/W6cK1Qx+4e

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks