General

  • Target

    JaffaCakes118_42534249872313b27f91bf95e74bba44

  • Size

    100KB

  • Sample

    250127-wrd6fs1khm

  • MD5

    42534249872313b27f91bf95e74bba44

  • SHA1

    5784ba75ff5636eb6155096f10578bbe5dbf2675

  • SHA256

    23ca076c17d9c3b14ceaf03352b7436cc5f846ea56db43385ff616be83ee8c97

  • SHA512

    15a94831fa4fe736f678305fb0290107733e47693a3e877949338cc15100274ff84b034bc4a380fa25eae1774244b2e35b90491de83041e8b3fed449bdf9c87c

  • SSDEEP

    1536:T7PBgK94D3qjI0OjSdCgTzluuDrxUn/qI7Vg8bOxPTRivnk7AMmAC3l:T7J7vOOdZuuDran/qciFTIvnk7A9/l

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_42534249872313b27f91bf95e74bba44

    • Size

      100KB

    • MD5

      42534249872313b27f91bf95e74bba44

    • SHA1

      5784ba75ff5636eb6155096f10578bbe5dbf2675

    • SHA256

      23ca076c17d9c3b14ceaf03352b7436cc5f846ea56db43385ff616be83ee8c97

    • SHA512

      15a94831fa4fe736f678305fb0290107733e47693a3e877949338cc15100274ff84b034bc4a380fa25eae1774244b2e35b90491de83041e8b3fed449bdf9c87c

    • SSDEEP

      1536:T7PBgK94D3qjI0OjSdCgTzluuDrxUn/qI7Vg8bOxPTRivnk7AMmAC3l:T7J7vOOdZuuDran/qciFTIvnk7A9/l

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks