General

  • Target

    JaffaCakes118_4c2b1a8b460eaace813fe83d3a5ec120

  • Size

    237KB

  • Sample

    250101-h822ysylby

  • MD5

    4c2b1a8b460eaace813fe83d3a5ec120

  • SHA1

    d674834351fecb2677f277a57f9fd9c1512358c1

  • SHA256

    c92c1f515a79eba054f41c1172a400592753b6ff22eb71939cc6537de1fd7b3a

  • SHA512

    feea7603855e8cdaa538d6fabeed3903c1f2c31b0cdada04a323ab239f88aeff867746ee7d1936b3c9ce0d13ec9691a605a29906220b8eda7b198b6ea24521c4

  • SSDEEP

    6144:1qBScZ5/OImunpQmMJ4KfZtatJmtRy6t9j:gBScDWJZteJmtnt9j

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_4c2b1a8b460eaace813fe83d3a5ec120

    • Size

      237KB

    • MD5

      4c2b1a8b460eaace813fe83d3a5ec120

    • SHA1

      d674834351fecb2677f277a57f9fd9c1512358c1

    • SHA256

      c92c1f515a79eba054f41c1172a400592753b6ff22eb71939cc6537de1fd7b3a

    • SHA512

      feea7603855e8cdaa538d6fabeed3903c1f2c31b0cdada04a323ab239f88aeff867746ee7d1936b3c9ce0d13ec9691a605a29906220b8eda7b198b6ea24521c4

    • SSDEEP

      6144:1qBScZ5/OImunpQmMJ4KfZtatJmtRy6t9j:gBScDWJZteJmtnt9j

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks