General

  • Target

    JaffaCakes118_afb501e76dc1063a9a631cb3de190647

  • Size

    268KB

  • Sample

    250206-1qspnszpdn

  • MD5

    afb501e76dc1063a9a631cb3de190647

  • SHA1

    27dbd0c9d9700e4b388045d0a91169ef04a187f2

  • SHA256

    e57bdbe56d5a64bc3c48516efd9ce6aeabf1fea02a809bf34331ab5a725fb5d5

  • SHA512

    71ac8b9c92231cc58298467ff7895c9980bc6f30d9373845dceccfe4c2a1b1fdd1cd5b6c5b45eb2bfdaff1f999416ca6d0f4443eeada1fe8a5aaa50ffe0c997b

  • SSDEEP

    6144:EjnmY52PhMVUkWl4hC23inPbQiY0tJNGh5:ER2PsWO1CjQ+NGh5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      JaffaCakes118_afb501e76dc1063a9a631cb3de190647

    • Size

      268KB

    • MD5

      afb501e76dc1063a9a631cb3de190647

    • SHA1

      27dbd0c9d9700e4b388045d0a91169ef04a187f2

    • SHA256

      e57bdbe56d5a64bc3c48516efd9ce6aeabf1fea02a809bf34331ab5a725fb5d5

    • SHA512

      71ac8b9c92231cc58298467ff7895c9980bc6f30d9373845dceccfe4c2a1b1fdd1cd5b6c5b45eb2bfdaff1f999416ca6d0f4443eeada1fe8a5aaa50ffe0c997b

    • SSDEEP

      6144:EjnmY52PhMVUkWl4hC23inPbQiY0tJNGh5:ER2PsWO1CjQ+NGh5

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks