General

  • Target

    JaffaCakes118_0743bf4adde21744067045661727ccf0

  • Size

    945KB

  • Sample

    241231-gf8hlaxmbn

  • MD5

    0743bf4adde21744067045661727ccf0

  • SHA1

    a00134fc4607176928a430b102f08b5915f67390

  • SHA256

    64029aae511cbfe5334ee3b8780713f3fae12784f3ac3f7a8605245ff5ebc8a7

  • SHA512

    a531c82e5066656b2e76a61928e0f3565b4b21569c608227952341a49b6567b82a7dd5f6b956b6ae97b960a291d2f5bd13c375565c2b618a7bb23ef6fd72b5a8

  • SSDEEP

    12288:fbvnf8UaJEjEKUBKuJyECjDW76LS/Uc7xX0gmbKgPdr/uduQXqOFuzsj5uJZv35W:zvoTKUsEyEyK+LS3g9KXqKtu73aB1nm4

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      JaffaCakes118_0743bf4adde21744067045661727ccf0

    • Size

      945KB

    • MD5

      0743bf4adde21744067045661727ccf0

    • SHA1

      a00134fc4607176928a430b102f08b5915f67390

    • SHA256

      64029aae511cbfe5334ee3b8780713f3fae12784f3ac3f7a8605245ff5ebc8a7

    • SHA512

      a531c82e5066656b2e76a61928e0f3565b4b21569c608227952341a49b6567b82a7dd5f6b956b6ae97b960a291d2f5bd13c375565c2b618a7bb23ef6fd72b5a8

    • SSDEEP

      12288:fbvnf8UaJEjEKUBKuJyECjDW76LS/Uc7xX0gmbKgPdr/uduQXqOFuzsj5uJZv35W:zvoTKUsEyEyK+LS3g9KXqKtu73aB1nm4

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks