General

  • Target

    JaffaCakes118_4ca1ec52ade5b3e848dae5ad0f3c1833

  • Size

    100KB

  • Sample

    250128-tbyttatmaz

  • MD5

    4ca1ec52ade5b3e848dae5ad0f3c1833

  • SHA1

    2dd8f2c3de8cc4093174faf404512d5acbf09fbb

  • SHA256

    49a1adbd7a183414a421578a424c9702d5a55f31c8f3f5e1cb82d37ce38b3a1a

  • SHA512

    38f2ca1152b02c66d94100148ef1db926e666d42424c85a0ffc130f0b7e8a8aef2973f37cb437fc05c6d6a328295f642c176b29c41460422195b4c7b67dfb0d0

  • SSDEEP

    1536:d0Y4+w6OSEl0Lgc3XfKom5vrXhxv5p9xbmte2dQu0Crc4F:dT4/FSEl0zfKf5DXvZxbmt1dQaJF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_4ca1ec52ade5b3e848dae5ad0f3c1833

    • Size

      100KB

    • MD5

      4ca1ec52ade5b3e848dae5ad0f3c1833

    • SHA1

      2dd8f2c3de8cc4093174faf404512d5acbf09fbb

    • SHA256

      49a1adbd7a183414a421578a424c9702d5a55f31c8f3f5e1cb82d37ce38b3a1a

    • SHA512

      38f2ca1152b02c66d94100148ef1db926e666d42424c85a0ffc130f0b7e8a8aef2973f37cb437fc05c6d6a328295f642c176b29c41460422195b4c7b67dfb0d0

    • SSDEEP

      1536:d0Y4+w6OSEl0Lgc3XfKom5vrXhxv5p9xbmte2dQu0Crc4F:dT4/FSEl0zfKf5DXvZxbmt1dQaJF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks