General

  • Target

    JaffaCakes118_9430cf55bdeb18ec163603403e26c68f

  • Size

    100KB

  • Sample

    250204-qdft8swrbt

  • MD5

    9430cf55bdeb18ec163603403e26c68f

  • SHA1

    80172ce24984065b7b6d60d945a49250d6f6a6f1

  • SHA256

    9afcdc735a123d390e47b7a733f91c7287e9c2ed4c9137d49b9cda757654d12b

  • SHA512

    e2e321c8ca739ce36bce2dbb9c3d6641216fb692efeb9ddcb3e58b218aa2b2678e61dc764ea5ec87a36c9ab410caebe5cacb69bf0359159d130e2f8af0094bc2

  • SSDEEP

    3072:M4ZJ1ApXICboSYtNUMVclhPTxkBj0XHVWSd8IABonSC2IPhb:MsJIXHXkOoclN6B4XHrdaBHyPhb

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_9430cf55bdeb18ec163603403e26c68f

    • Size

      100KB

    • MD5

      9430cf55bdeb18ec163603403e26c68f

    • SHA1

      80172ce24984065b7b6d60d945a49250d6f6a6f1

    • SHA256

      9afcdc735a123d390e47b7a733f91c7287e9c2ed4c9137d49b9cda757654d12b

    • SHA512

      e2e321c8ca739ce36bce2dbb9c3d6641216fb692efeb9ddcb3e58b218aa2b2678e61dc764ea5ec87a36c9ab410caebe5cacb69bf0359159d130e2f8af0094bc2

    • SSDEEP

      3072:M4ZJ1ApXICboSYtNUMVclhPTxkBj0XHVWSd8IABonSC2IPhb:MsJIXHXkOoclN6B4XHrdaBHyPhb

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks