General

  • Target

    JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620

  • Size

    573KB

  • Sample

    250103-ffz1sasqhj

  • MD5

    6a5538abf08dea7ea3d38892c1cf6620

  • SHA1

    8c0e4b75f455e9d26bd0252126891d4fbf5a366f

  • SHA256

    678868b0d661db2371a50165fd01806c5cd9435bd18d29cf09c9f9a6d5c0c5b1

  • SHA512

    83fecb0ccaa1757ea055f6d9a6d2671ddf7d615de9d94bd6ba586214c1ddca6f61f5fbc83ed5922e40dbee828da218cb2073f8866c2c33e5e127c6d9e77fa622

  • SSDEEP

    6144:eE3pV90gzsIHn+NzocVIsGesIIohL7197Ey076r1c8X/3vAgyy7CI/HQC+IIqumu:eGJckHsIQ7Iy0R8P3vmtIbS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_6a5538abf08dea7ea3d38892c1cf6620

    • Size

      573KB

    • MD5

      6a5538abf08dea7ea3d38892c1cf6620

    • SHA1

      8c0e4b75f455e9d26bd0252126891d4fbf5a366f

    • SHA256

      678868b0d661db2371a50165fd01806c5cd9435bd18d29cf09c9f9a6d5c0c5b1

    • SHA512

      83fecb0ccaa1757ea055f6d9a6d2671ddf7d615de9d94bd6ba586214c1ddca6f61f5fbc83ed5922e40dbee828da218cb2073f8866c2c33e5e127c6d9e77fa622

    • SSDEEP

      6144:eE3pV90gzsIHn+NzocVIsGesIIohL7197Ey076r1c8X/3vAgyy7CI/HQC+IIqumu:eGJckHsIQ7Iy0R8P3vmtIbS

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks