General

  • Target

    JaffaCakes118_50eea57eb2668739e3a32ace33c0b9de

  • Size

    100KB

  • Sample

    250305-hc612a1qw2

  • MD5

    50eea57eb2668739e3a32ace33c0b9de

  • SHA1

    6fa79d47a3f5f881b17d62f1164c1f572c21d66e

  • SHA256

    22eb91870cad89fb20c5cca11179723c13281504fafda88fce92d2d89f9aea0e

  • SHA512

    a8ae3407800f183a8722c5e6509ab39d1e13cb755502cd30c6307ef60d81d010e05bf4f276299ab623f4a331cb9cee10c8af99e2bda67697964beaf0dcafa1fe

  • SSDEEP

    1536:gn4ttz8hqGJwVzSNDtNyDMCXW3nXz835Uvkw1nwxuYJeupiysHnsIpmfTVe7XXp:g4thXGkzS5q7Uvkunl0eSLr47X5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_50eea57eb2668739e3a32ace33c0b9de

    • Size

      100KB

    • MD5

      50eea57eb2668739e3a32ace33c0b9de

    • SHA1

      6fa79d47a3f5f881b17d62f1164c1f572c21d66e

    • SHA256

      22eb91870cad89fb20c5cca11179723c13281504fafda88fce92d2d89f9aea0e

    • SHA512

      a8ae3407800f183a8722c5e6509ab39d1e13cb755502cd30c6307ef60d81d010e05bf4f276299ab623f4a331cb9cee10c8af99e2bda67697964beaf0dcafa1fe

    • SSDEEP

      1536:gn4ttz8hqGJwVzSNDtNyDMCXW3nXz835Uvkw1nwxuYJeupiysHnsIpmfTVe7XXp:g4thXGkzS5q7Uvkunl0eSLr47X5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks