General

  • Target

    JaffaCakes118_3aa1d32f3bd8261d0b67cd7a1bce9036

  • Size

    100KB

  • Sample

    250127-bc3v2ssmhv

  • MD5

    3aa1d32f3bd8261d0b67cd7a1bce9036

  • SHA1

    c3c47f44bb9095a9b9ad7965f171cb263fd78339

  • SHA256

    2c873fedd01f5bee790c3aa3be033580318dad3592ec0a3fa55397e4978e010e

  • SHA512

    56e65339dfe7216ecd29a722c4f35d844000959b7c7ca671c0b49fed60fb6924f0ebe00821d97472e507aac3d2e455d883ce93372db652af90f27c769aaa84a0

  • SSDEEP

    3072:quVMYaiLyozQYMFUMijOk4qgp0DL2Tn12yi:quXaUQPi8qgp0WF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_3aa1d32f3bd8261d0b67cd7a1bce9036

    • Size

      100KB

    • MD5

      3aa1d32f3bd8261d0b67cd7a1bce9036

    • SHA1

      c3c47f44bb9095a9b9ad7965f171cb263fd78339

    • SHA256

      2c873fedd01f5bee790c3aa3be033580318dad3592ec0a3fa55397e4978e010e

    • SHA512

      56e65339dfe7216ecd29a722c4f35d844000959b7c7ca671c0b49fed60fb6924f0ebe00821d97472e507aac3d2e455d883ce93372db652af90f27c769aaa84a0

    • SSDEEP

      3072:quVMYaiLyozQYMFUMijOk4qgp0DL2Tn12yi:quXaUQPi8qgp0WF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks