General

  • Target

    JaffaCakes118_a0e47b253fcbd7d3de29927caf17c123

  • Size

    100KB

  • Sample

    250205-sh7jvs1pf1

  • MD5

    a0e47b253fcbd7d3de29927caf17c123

  • SHA1

    f86234e821d640fe86e03df57250be30c650c91e

  • SHA256

    30f8e285e8d7e6904e6a541223e4c98cd4d6311c19a5a45ebbc2701cd2c6f640

  • SHA512

    31ecc7b65eadd153c996400f1a51b16a1ef706ee44dbb5657b435081a5bb3717159f08d04e2e09b6dca34c3e953f61ab0468a17b488ab455c344a7288a7e5638

  • SSDEEP

    3072:9Ss/RsHzTJxnqUXJe1inmPmHxmXKhPVC:YsOHzvfJ986DhPV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_a0e47b253fcbd7d3de29927caf17c123

    • Size

      100KB

    • MD5

      a0e47b253fcbd7d3de29927caf17c123

    • SHA1

      f86234e821d640fe86e03df57250be30c650c91e

    • SHA256

      30f8e285e8d7e6904e6a541223e4c98cd4d6311c19a5a45ebbc2701cd2c6f640

    • SHA512

      31ecc7b65eadd153c996400f1a51b16a1ef706ee44dbb5657b435081a5bb3717159f08d04e2e09b6dca34c3e953f61ab0468a17b488ab455c344a7288a7e5638

    • SSDEEP

      3072:9Ss/RsHzTJxnqUXJe1inmPmHxmXKhPVC:YsOHzvfJ986DhPV

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks