General

  • Target

    JaffaCakes118_5da74b46fb892eb20203d8cfb1623ed7

  • Size

    124KB

  • Sample

    250130-cpbsrsvkam

  • MD5

    5da74b46fb892eb20203d8cfb1623ed7

  • SHA1

    32bb5a28f1b94e9bafff6f12dc49898ed57b85b7

  • SHA256

    53ad99064fb71993e8d1074d2be599354adca1a56731b5869a7829fb80e427e7

  • SHA512

    801f1b56bfd6aee572f7e733de84a0e8027decbf97f9adf1bdb6d6da07c1eceaf3f1b8dc62df57be50a3bf6e15c1ddfff1a17c7da2407a461ea8ce59a9d622a1

  • SSDEEP

    1536:2Btk3CcCE7/ayjiKRNLJESu8SG3YQeC6gxOgpm95r1eQW0fds+0OHyvMzuY7BDCM:2ZcCuSyjiKRTEP8T35eprcqx/MMz5JFL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_5da74b46fb892eb20203d8cfb1623ed7

    • Size

      124KB

    • MD5

      5da74b46fb892eb20203d8cfb1623ed7

    • SHA1

      32bb5a28f1b94e9bafff6f12dc49898ed57b85b7

    • SHA256

      53ad99064fb71993e8d1074d2be599354adca1a56731b5869a7829fb80e427e7

    • SHA512

      801f1b56bfd6aee572f7e733de84a0e8027decbf97f9adf1bdb6d6da07c1eceaf3f1b8dc62df57be50a3bf6e15c1ddfff1a17c7da2407a461ea8ce59a9d622a1

    • SSDEEP

      1536:2Btk3CcCE7/ayjiKRNLJESu8SG3YQeC6gxOgpm95r1eQW0fds+0OHyvMzuY7BDCM:2ZcCuSyjiKRTEP8T35eprcqx/MMz5JFL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks