General

  • Target

    JaffaCakes118_80a044c5d9e94a69472172fa8db49823

  • Size

    1.0MB

  • Sample

    250202-zfcp2azkhl

  • MD5

    80a044c5d9e94a69472172fa8db49823

  • SHA1

    b82b750e00b06477505c818b841953d8d3f6e3e2

  • SHA256

    49b46b9d73a0c39269501a9ee90145c71c9f20e582303aeb5b9777e3f6808845

  • SHA512

    483f95e799663d9542625567dcfb31ab99f49cbf98ba06c2ddf91ade82991972a2c2bedc8cfc647659c97dbb4090917bafdea2355678cb84258452eb58e7c387

  • SSDEEP

    24576:2VoQ0WH84QRpnyuScebMk6XJBlOxv5BJy4y+8n2LZSiribnA:f2H84QiMXvl6LJyM8msiB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_80a044c5d9e94a69472172fa8db49823

    • Size

      1.0MB

    • MD5

      80a044c5d9e94a69472172fa8db49823

    • SHA1

      b82b750e00b06477505c818b841953d8d3f6e3e2

    • SHA256

      49b46b9d73a0c39269501a9ee90145c71c9f20e582303aeb5b9777e3f6808845

    • SHA512

      483f95e799663d9542625567dcfb31ab99f49cbf98ba06c2ddf91ade82991972a2c2bedc8cfc647659c97dbb4090917bafdea2355678cb84258452eb58e7c387

    • SSDEEP

      24576:2VoQ0WH84QRpnyuScebMk6XJBlOxv5BJy4y+8n2LZSiribnA:f2H84QiMXvl6LJyM8msiB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks