General

  • Target

    JaffaCakes118_3067891e776418a06ea4076f6a15e24b

  • Size

    100KB

  • Sample

    250125-2zqr4stjez

  • MD5

    3067891e776418a06ea4076f6a15e24b

  • SHA1

    6a1cb1b442a4a3a04041ddd5462313ce9ab16342

  • SHA256

    5ba40d6ec3b221b7bcc90a2be7251660aaaa13198e055a3e9a8d366b248e2937

  • SHA512

    1807fae67d9cc981b915df6dfcd7984ea63b7645d7a7e872bf920b75dc3616a5ff9268d4d2a1d2bb8bd15aa3d8643e25d0bec455cfdc2dd5cc4d9644d64f3d84

  • SSDEEP

    1536:lYweGULLQ53iTZ5RSTTtlTh9uu0MtUey1f4zlTdWabTu5t67Fhhkx45MG:ReUegnV8MLy1KuabTMUZu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_3067891e776418a06ea4076f6a15e24b

    • Size

      100KB

    • MD5

      3067891e776418a06ea4076f6a15e24b

    • SHA1

      6a1cb1b442a4a3a04041ddd5462313ce9ab16342

    • SHA256

      5ba40d6ec3b221b7bcc90a2be7251660aaaa13198e055a3e9a8d366b248e2937

    • SHA512

      1807fae67d9cc981b915df6dfcd7984ea63b7645d7a7e872bf920b75dc3616a5ff9268d4d2a1d2bb8bd15aa3d8643e25d0bec455cfdc2dd5cc4d9644d64f3d84

    • SSDEEP

      1536:lYweGULLQ53iTZ5RSTTtlTh9uu0MtUey1f4zlTdWabTu5t67Fhhkx45MG:ReUegnV8MLy1KuabTMUZu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks