General

  • Target

    JaffaCakes118_ac45de88389e859b17cc6cb245052139

  • Size

    100KB

  • Sample

    250206-rxddwszjem

  • MD5

    ac45de88389e859b17cc6cb245052139

  • SHA1

    5b8e28dc1a7cc7751a5ad20145add0fb2027d257

  • SHA256

    9e558161d6186e4987183012dc1b2ebdc3606f416bea437ac76e1b5202bb02f2

  • SHA512

    d0cbc206144a3efc9f44676c531b6a80da85a1857cbf1a048a7ff7e1851b2cbe7c6c3bb0bf86a50f724537f7c293d6e994f83ed55fc03c63d06fb59bc1e727a7

  • SSDEEP

    3072:5O1qJ+kh+eIMQq5auxasau/xomHgdGr8Jdifzunx0YOzjBT:5O1U1h+eIMn5hou/xBB0Qp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_ac45de88389e859b17cc6cb245052139

    • Size

      100KB

    • MD5

      ac45de88389e859b17cc6cb245052139

    • SHA1

      5b8e28dc1a7cc7751a5ad20145add0fb2027d257

    • SHA256

      9e558161d6186e4987183012dc1b2ebdc3606f416bea437ac76e1b5202bb02f2

    • SHA512

      d0cbc206144a3efc9f44676c531b6a80da85a1857cbf1a048a7ff7e1851b2cbe7c6c3bb0bf86a50f724537f7c293d6e994f83ed55fc03c63d06fb59bc1e727a7

    • SSDEEP

      3072:5O1qJ+kh+eIMQq5auxasau/xomHgdGr8Jdifzunx0YOzjBT:5O1U1h+eIMn5hou/xBB0Qp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks