General

  • Target

    JaffaCakes118_710031a5f737bc6d02d7488d27545d4f

  • Size

    100KB

  • Sample

    250201-m4r4eayphs

  • MD5

    710031a5f737bc6d02d7488d27545d4f

  • SHA1

    0d2ae9aeac351e23a1d8f068df403f4bde8cca98

  • SHA256

    06e73302631668c109325e65f9708022bb9596dd6cc74e8e76bdca83e339a840

  • SHA512

    bfa9e59b725844ffcedb175f075874dd33889fa2b8dbdeeec3ce2daf55d96f9deb36eb2f97c75ede2541cbca3b2255605412d9bd2e0d7f14c1a4716ef591081a

  • SSDEEP

    1536:Eze/JA11fN9cSzK1ZTsr1uQF+jw3ETTye9bP2cbmjncYVgGSWtTD897H1HxyAlas:EGi1wSGY1uQEj3/z5E4m8J1RyAlab

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_710031a5f737bc6d02d7488d27545d4f

    • Size

      100KB

    • MD5

      710031a5f737bc6d02d7488d27545d4f

    • SHA1

      0d2ae9aeac351e23a1d8f068df403f4bde8cca98

    • SHA256

      06e73302631668c109325e65f9708022bb9596dd6cc74e8e76bdca83e339a840

    • SHA512

      bfa9e59b725844ffcedb175f075874dd33889fa2b8dbdeeec3ce2daf55d96f9deb36eb2f97c75ede2541cbca3b2255605412d9bd2e0d7f14c1a4716ef591081a

    • SSDEEP

      1536:Eze/JA11fN9cSzK1ZTsr1uQF+jw3ETTye9bP2cbmjncYVgGSWtTD897H1HxyAlas:EGi1wSGY1uQEj3/z5E4m8J1RyAlab

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks