General

  • Target

    JaffaCakes118_813224d4b14fbe6b2579eb3052ec75a9

  • Size

    141KB

  • Sample

    250202-1qlala1qcr

  • MD5

    813224d4b14fbe6b2579eb3052ec75a9

  • SHA1

    7446d40aab75de3288667941795eb08cec01a74a

  • SHA256

    29fb962061a2dc06e0c8bf06a9cd00562ce275d15e21f94d4c3e35eef282bccb

  • SHA512

    0bcca420506eb3ba631842fdc40037c69f22fd9e6ca77dc9ed782b0270ca474657ef889ee0858adf0a74892b1fce307763e97107289d112e2fb278b656423786

  • SSDEEP

    1536:JxqjQ+P04wsmJCUvw3AlwF8oodD+6jNX6e2/mGbo+7IuB7YLPrKyON3lPWgC/xXG:sr85CQw3A+cxV2p37zgrvoF3O4T7oYB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_813224d4b14fbe6b2579eb3052ec75a9

    • Size

      141KB

    • MD5

      813224d4b14fbe6b2579eb3052ec75a9

    • SHA1

      7446d40aab75de3288667941795eb08cec01a74a

    • SHA256

      29fb962061a2dc06e0c8bf06a9cd00562ce275d15e21f94d4c3e35eef282bccb

    • SHA512

      0bcca420506eb3ba631842fdc40037c69f22fd9e6ca77dc9ed782b0270ca474657ef889ee0858adf0a74892b1fce307763e97107289d112e2fb278b656423786

    • SSDEEP

      1536:JxqjQ+P04wsmJCUvw3AlwF8oodD+6jNX6e2/mGbo+7IuB7YLPrKyON3lPWgC/xXG:sr85CQw3A+cxV2p37zgrvoF3O4T7oYB

    • Detect Neshta payload

    • Modifies firewall policy service

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks