General

  • Target

    JaffaCakes118_b86985b99be36aec81eae7683d3d574b

  • Size

    97KB

  • Sample

    250207-skexmawjdv

  • MD5

    b86985b99be36aec81eae7683d3d574b

  • SHA1

    357963afcfb36c13c3324e00b054d7ea8a2f97f5

  • SHA256

    58d6873371ffd2e953c6f33c013e53dffba48f0865ecf26c591542000a900ee4

  • SHA512

    48f6c35b6df24ede14fa6915285d39aa74681d8b4e9f93abbadae3e942cdc99800c5bfb3f24e1fc48bf62395afcd54c3b8befdb9f42579be29abcc1313485eff

  • SSDEEP

    3072:jSrIgiPd4IMktqJhvycBevLfq6s+xdp6:O7iPiIMktqHDQTC6s+x

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      JaffaCakes118_b86985b99be36aec81eae7683d3d574b

    • Size

      97KB

    • MD5

      b86985b99be36aec81eae7683d3d574b

    • SHA1

      357963afcfb36c13c3324e00b054d7ea8a2f97f5

    • SHA256

      58d6873371ffd2e953c6f33c013e53dffba48f0865ecf26c591542000a900ee4

    • SHA512

      48f6c35b6df24ede14fa6915285d39aa74681d8b4e9f93abbadae3e942cdc99800c5bfb3f24e1fc48bf62395afcd54c3b8befdb9f42579be29abcc1313485eff

    • SSDEEP

      3072:jSrIgiPd4IMktqJhvycBevLfq6s+xdp6:O7iPiIMktqHDQTC6s+x

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks