General

  • Target

    JaffaCakes118_7a93711b9e43bf3592afa82d08a39183

  • Size

    1.0MB

  • Sample

    250104-thlg3aymbk

  • MD5

    7a93711b9e43bf3592afa82d08a39183

  • SHA1

    31002d95ede8024a4391250c4f52c9639efb47a4

  • SHA256

    4d9592240ba9b45e0926420620c3d3edfbb1eb628c9dbb40d47769455301bc1c

  • SHA512

    a62360cfc580051b6980f47619a9008b29d9ff3986923838e0d19fd3dfab9e69e43b5f308021605084360f184170ffc0e4a1a215cea417a36ec514a6e1bcf8f7

  • SSDEEP

    24576:lKT4+OyYLf9lVvCNkFNXCaSUsGSY/Dwyw8rGaF:lKE+6BlFCNkFNXCaSdVN8JF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_7a93711b9e43bf3592afa82d08a39183

    • Size

      1.0MB

    • MD5

      7a93711b9e43bf3592afa82d08a39183

    • SHA1

      31002d95ede8024a4391250c4f52c9639efb47a4

    • SHA256

      4d9592240ba9b45e0926420620c3d3edfbb1eb628c9dbb40d47769455301bc1c

    • SHA512

      a62360cfc580051b6980f47619a9008b29d9ff3986923838e0d19fd3dfab9e69e43b5f308021605084360f184170ffc0e4a1a215cea417a36ec514a6e1bcf8f7

    • SSDEEP

      24576:lKT4+OyYLf9lVvCNkFNXCaSUsGSY/Dwyw8rGaF:lKE+6BlFCNkFNXCaSdVN8JF

    • Detect Neshta payload

    • Modifies firewall policy service

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks