General

  • Target

    JaffaCakes118_8baaee6191f3b86675e4431f4d7a32dc

  • Size

    1.1MB

  • Sample

    250203-xnjgfa1qbm

  • MD5

    8baaee6191f3b86675e4431f4d7a32dc

  • SHA1

    7e836b9d0642b03ceb37ed2d1802ed3dc0a3b74f

  • SHA256

    53f084ac3b030f643b913cdb1e0df6129e1a3f8e4a7e492e368512a20c522e60

  • SHA512

    cb8ac4427986592209e3851ac613d5fb5cb7460fbc84271f30bc459e8f6a46038882c43f568b4d6d115836f1c525b87f80c43546553d6735e758e6d2ea3f9598

  • SSDEEP

    24576:JrJRMGPhe6mVVwRGe6KXvw/CUnu1kWiaz09Ugf3/T/0YS:hJRjPY60wYQXvVUn8PM3bsYS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_8baaee6191f3b86675e4431f4d7a32dc

    • Size

      1.1MB

    • MD5

      8baaee6191f3b86675e4431f4d7a32dc

    • SHA1

      7e836b9d0642b03ceb37ed2d1802ed3dc0a3b74f

    • SHA256

      53f084ac3b030f643b913cdb1e0df6129e1a3f8e4a7e492e368512a20c522e60

    • SHA512

      cb8ac4427986592209e3851ac613d5fb5cb7460fbc84271f30bc459e8f6a46038882c43f568b4d6d115836f1c525b87f80c43546553d6735e758e6d2ea3f9598

    • SSDEEP

      24576:JrJRMGPhe6mVVwRGe6KXvw/CUnu1kWiaz09Ugf3/T/0YS:hJRjPY60wYQXvVUn8PM3bsYS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks