General

  • Target

    JaffaCakes118_b5ba83552596c9475d68a172569aaaa1

  • Size

    100KB

  • Sample

    250207-lwbk1sxjcy

  • MD5

    b5ba83552596c9475d68a172569aaaa1

  • SHA1

    b42fe338e104a4f8f4d30c9dbef34cbcc616414b

  • SHA256

    7ce084c3dba320d6722ade122d92da4cf813f8977f76112505858a2dfe8289c8

  • SHA512

    1a4abef7085e678b7af12f26ed4cbfe0719cc1efc9609b9c69b3629fe40384b72e0243fc4fb2275c955cd254feffa793591c2c6c77ac9f10437150799ef32056

  • SSDEEP

    3072:qYLEozhHxgj5iUcnFMbo3pmscSeqPUeH8:qqLvgjvcFmo3pmsZZ8ec

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_b5ba83552596c9475d68a172569aaaa1

    • Size

      100KB

    • MD5

      b5ba83552596c9475d68a172569aaaa1

    • SHA1

      b42fe338e104a4f8f4d30c9dbef34cbcc616414b

    • SHA256

      7ce084c3dba320d6722ade122d92da4cf813f8977f76112505858a2dfe8289c8

    • SHA512

      1a4abef7085e678b7af12f26ed4cbfe0719cc1efc9609b9c69b3629fe40384b72e0243fc4fb2275c955cd254feffa793591c2c6c77ac9f10437150799ef32056

    • SSDEEP

      3072:qYLEozhHxgj5iUcnFMbo3pmscSeqPUeH8:qqLvgjvcFmo3pmsZZ8ec

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks