General

  • Target

    JaffaCakes118_3733e6da82859409e65b7871f6cc08ed

  • Size

    165KB

  • Sample

    250126-tt2y7awnfz

  • MD5

    3733e6da82859409e65b7871f6cc08ed

  • SHA1

    53a6482b4be7e4274fe7523618689a5daa9adc26

  • SHA256

    46a75b3dadbc6f9cdccd2edd93c00e29f7982d0c1f5b4267d0a7032b913c4097

  • SHA512

    3291c14487598f62421faa51156f3f584cf0fe7bfc80cbab37df95fd11b0b2d2ff05cd8ecddc7ed0c52bdfd23c6143c79df2eed3db5673bf3b3449bfde830ebc

  • SSDEEP

    3072:sr85C8Oedj30QpoZ3RJRrmyuXod5rQIpRTXJ:k9QdjkQG5Vluer5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_3733e6da82859409e65b7871f6cc08ed

    • Size

      165KB

    • MD5

      3733e6da82859409e65b7871f6cc08ed

    • SHA1

      53a6482b4be7e4274fe7523618689a5daa9adc26

    • SHA256

      46a75b3dadbc6f9cdccd2edd93c00e29f7982d0c1f5b4267d0a7032b913c4097

    • SHA512

      3291c14487598f62421faa51156f3f584cf0fe7bfc80cbab37df95fd11b0b2d2ff05cd8ecddc7ed0c52bdfd23c6143c79df2eed3db5673bf3b3449bfde830ebc

    • SSDEEP

      3072:sr85C8Oedj30QpoZ3RJRrmyuXod5rQIpRTXJ:k9QdjkQG5Vluer5

    • Detect Neshta payload

    • Modifies firewall policy service

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks