General

  • Target

    JaffaCakes118_511ce68def4409e1f6cd108601eeacbd

  • Size

    134KB

  • Sample

    250129-bgc57ayqhm

  • MD5

    511ce68def4409e1f6cd108601eeacbd

  • SHA1

    66096cd45e9275624fcb2c0d6d5eb21bdae3767b

  • SHA256

    20dbdcbcb3356a4ab2bc3b21e6da4f946a17c21baafcb77daf895e4a0d5adbac

  • SHA512

    2a42060fbba139a9a8702e12fe3e14c7e33729d6a722815015c7e4801669ef6ef07e442d37fb69bd0e776696bf5693ba54448d7970edda7b8c2e59fa0ca9c8c3

  • SSDEEP

    3072:37kDOJ2+dKSBCt71xt8RddBKoN8spx5bgzZbytRxP0by6G:rkDOJ2+dKSBCtpGddYoNxxZyZbytrd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      JaffaCakes118_511ce68def4409e1f6cd108601eeacbd

    • Size

      134KB

    • MD5

      511ce68def4409e1f6cd108601eeacbd

    • SHA1

      66096cd45e9275624fcb2c0d6d5eb21bdae3767b

    • SHA256

      20dbdcbcb3356a4ab2bc3b21e6da4f946a17c21baafcb77daf895e4a0d5adbac

    • SHA512

      2a42060fbba139a9a8702e12fe3e14c7e33729d6a722815015c7e4801669ef6ef07e442d37fb69bd0e776696bf5693ba54448d7970edda7b8c2e59fa0ca9c8c3

    • SSDEEP

      3072:37kDOJ2+dKSBCt71xt8RddBKoN8spx5bgzZbytRxP0by6G:rkDOJ2+dKSBCtpGddYoNxxZyZbytrd

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks