General

  • Target

    JaffaCakes118_0621c3f3a262ce7e64a5fe9cb5706520

  • Size

    233KB

  • Sample

    241231-fw2vbazjby

  • MD5

    0621c3f3a262ce7e64a5fe9cb5706520

  • SHA1

    4475324756e78883fcd911eb649db2ba15b4dbe7

  • SHA256

    f6095c12de5e32ca44e64607815cf99cb8826a9eb60bf01bac3e362edcd39803

  • SHA512

    d2905f4158cc24897122129dbd7a8ea0ebe1acdee2ddaf25ceda65c0a9724088a22f74c937ce834b3a3a97fe9255308fecb09dccfb7addc356970f4443bb81a0

  • SSDEEP

    3072:ebq9FP/7UNphUAUXWbGCa0/b0QtRegrz1MboTwyV1jKoyzMwq5AxlEWm:eYJGOAUmbGhJezCbo0yVMvlEWm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      JaffaCakes118_0621c3f3a262ce7e64a5fe9cb5706520

    • Size

      233KB

    • MD5

      0621c3f3a262ce7e64a5fe9cb5706520

    • SHA1

      4475324756e78883fcd911eb649db2ba15b4dbe7

    • SHA256

      f6095c12de5e32ca44e64607815cf99cb8826a9eb60bf01bac3e362edcd39803

    • SHA512

      d2905f4158cc24897122129dbd7a8ea0ebe1acdee2ddaf25ceda65c0a9724088a22f74c937ce834b3a3a97fe9255308fecb09dccfb7addc356970f4443bb81a0

    • SSDEEP

      3072:ebq9FP/7UNphUAUXWbGCa0/b0QtRegrz1MboTwyV1jKoyzMwq5AxlEWm:eYJGOAUmbGhJezCbo0yVMvlEWm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Creates new service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks