General

  • Target

    JaffaCakes118_45ec92bbcef52cbefffca41675a442c7

  • Size

    100KB

  • Sample

    250101-eaay2atley

  • MD5

    45ec92bbcef52cbefffca41675a442c7

  • SHA1

    c0a08cfe7de444de33c11419074939aade091430

  • SHA256

    30efe4ef3ec60d14c029f489649e1f6bb92395c629321c22b1ce4c229dc760d8

  • SHA512

    24d9f82f9f5b2da498c215e8c2e7b5e635002f083025b31ed9712e04bdad3b52d39f3c39b77035dfa3ee61abeb09d0903b7c07e47684723d01f0efaa24fec449

  • SSDEEP

    3072:iJ97rkRbHUMxzB4iP9KITeOv9bA/R6bynX0:Wk9U4944A/R6mk

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_45ec92bbcef52cbefffca41675a442c7

    • Size

      100KB

    • MD5

      45ec92bbcef52cbefffca41675a442c7

    • SHA1

      c0a08cfe7de444de33c11419074939aade091430

    • SHA256

      30efe4ef3ec60d14c029f489649e1f6bb92395c629321c22b1ce4c229dc760d8

    • SHA512

      24d9f82f9f5b2da498c215e8c2e7b5e635002f083025b31ed9712e04bdad3b52d39f3c39b77035dfa3ee61abeb09d0903b7c07e47684723d01f0efaa24fec449

    • SSDEEP

      3072:iJ97rkRbHUMxzB4iP9KITeOv9bA/R6bynX0:Wk9U4944A/R6mk

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks