General

  • Target

    JaffaCakes118_876c42866076bf9f3450332e3dac80f0

  • Size

    322KB

  • Sample

    250203-mdvfvaznhn

  • MD5

    876c42866076bf9f3450332e3dac80f0

  • SHA1

    aa39d26fcf7a56971ddbd5779a5cbc4cd91999e0

  • SHA256

    24f5ee91e74218a089b2516bcbbdc383f332daf65dfec4ea6e931b972f6b337f

  • SHA512

    c4e71dac5125d19054f72052d371776693edfe8203f7b8a0f07fe199cdf1a6fcfa360a9e9fd546f821e5f6bce1ae42d07fe029eb2cfbdbd2ba2a31500c046a1f

  • SSDEEP

    6144:YNYMViiff/JSTiTA5UqD107UQrCUN0VtQW0N/5SLUYT:O3RgiTceAhU8tWRILLT

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_876c42866076bf9f3450332e3dac80f0

    • Size

      322KB

    • MD5

      876c42866076bf9f3450332e3dac80f0

    • SHA1

      aa39d26fcf7a56971ddbd5779a5cbc4cd91999e0

    • SHA256

      24f5ee91e74218a089b2516bcbbdc383f332daf65dfec4ea6e931b972f6b337f

    • SHA512

      c4e71dac5125d19054f72052d371776693edfe8203f7b8a0f07fe199cdf1a6fcfa360a9e9fd546f821e5f6bce1ae42d07fe029eb2cfbdbd2ba2a31500c046a1f

    • SSDEEP

      6144:YNYMViiff/JSTiTA5UqD107UQrCUN0VtQW0N/5SLUYT:O3RgiTceAhU8tWRILLT

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks