General

  • Target

    JaffaCakes118_9e6f8e0fbc8d60f0f20215dfb77048e1

  • Size

    100KB

  • Sample

    250205-lzpbaasqhk

  • MD5

    9e6f8e0fbc8d60f0f20215dfb77048e1

  • SHA1

    1e2096d9c5ee302cd7a385e03cec0f85bd37e887

  • SHA256

    45c326ed36d26eae6e538dabea92053e9b192efcf1f00f77e1f26a82674a40c5

  • SHA512

    f51311fcc849e5751feb358e2f3cc871aa60c2cf5f34155ec4bf74bd75f881fdc4485f293a8ff49ac716abe33a68fe958c65df7d35bb8cd78b44cc060f00fad6

  • SSDEEP

    1536:o+ElR8StmCwTKEC9qnheZ6CSsvrXTqfMdHrafaIA+qW:Mn8rT2ghc6CSsDDkwLa1A

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_9e6f8e0fbc8d60f0f20215dfb77048e1

    • Size

      100KB

    • MD5

      9e6f8e0fbc8d60f0f20215dfb77048e1

    • SHA1

      1e2096d9c5ee302cd7a385e03cec0f85bd37e887

    • SHA256

      45c326ed36d26eae6e538dabea92053e9b192efcf1f00f77e1f26a82674a40c5

    • SHA512

      f51311fcc849e5751feb358e2f3cc871aa60c2cf5f34155ec4bf74bd75f881fdc4485f293a8ff49ac716abe33a68fe958c65df7d35bb8cd78b44cc060f00fad6

    • SSDEEP

      1536:o+ElR8StmCwTKEC9qnheZ6CSsvrXTqfMdHrafaIA+qW:Mn8rT2ghc6CSsDDkwLa1A

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks