General

  • Target

    JaffaCakes118_54f4a2708461b5b9634ceae3c179ffa1

  • Size

    100KB

  • Sample

    250306-e4s2psyqt7

  • MD5

    54f4a2708461b5b9634ceae3c179ffa1

  • SHA1

    6ab6ff92c55ded7989019bdf81b62ec9e05bb688

  • SHA256

    fdf30a49e3b6ae9aba65afe689372f45b75ffdf410eee5bb5c72db6507b4afa0

  • SHA512

    ae56cc32dd5783c258df4211356323df26a003de7e7a365f910aa39a82c4ba377fae16af6a08573ae9d0a225f399f8338e111be8aafd87f3557cd54c4154f6b2

  • SSDEEP

    1536:I2+O1cht/g99mKAvOwh9abnkRy6x5ja8PnKXaabq/fa2Zf+A7Ag0/ywjdgFiS+Hj:8Xht/2HAvHNLPKKae/SNWn0fde+kpt

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_54f4a2708461b5b9634ceae3c179ffa1

    • Size

      100KB

    • MD5

      54f4a2708461b5b9634ceae3c179ffa1

    • SHA1

      6ab6ff92c55ded7989019bdf81b62ec9e05bb688

    • SHA256

      fdf30a49e3b6ae9aba65afe689372f45b75ffdf410eee5bb5c72db6507b4afa0

    • SHA512

      ae56cc32dd5783c258df4211356323df26a003de7e7a365f910aa39a82c4ba377fae16af6a08573ae9d0a225f399f8338e111be8aafd87f3557cd54c4154f6b2

    • SSDEEP

      1536:I2+O1cht/g99mKAvOwh9abnkRy6x5ja8PnKXaabq/fa2Zf+A7Ag0/ywjdgFiS+Hj:8Xht/2HAvHNLPKKae/SNWn0fde+kpt

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks