General

  • Target

    JaffaCakes118_9acacb968b139087276dfb60464ece25

  • Size

    100KB

  • Sample

    250405-rhrmza1pw9

  • MD5

    9acacb968b139087276dfb60464ece25

  • SHA1

    e6539f9a709968d6bc758b8b208c5bc40a02ed1a

  • SHA256

    df91314b50bf1dc1ec1c7cf0e03c32419c201571e2dba4d755bdd7ec76904239

  • SHA512

    db2f24cf96cfe05562ade503c34b52fd83c58a4bd11d65554bad9c7ec541bb23a33ddf9134b3af9f3f2ceaf6085c8a06a69879dbf4ea551449c5179f5001014d

  • SSDEEP

    3072:+q2AECtom0zK8YnYXBQW2xMuJSHoZWcsT:4+1gBlXO5rJSHY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      JaffaCakes118_9acacb968b139087276dfb60464ece25

    • Size

      100KB

    • MD5

      9acacb968b139087276dfb60464ece25

    • SHA1

      e6539f9a709968d6bc758b8b208c5bc40a02ed1a

    • SHA256

      df91314b50bf1dc1ec1c7cf0e03c32419c201571e2dba4d755bdd7ec76904239

    • SHA512

      db2f24cf96cfe05562ade503c34b52fd83c58a4bd11d65554bad9c7ec541bb23a33ddf9134b3af9f3f2ceaf6085c8a06a69879dbf4ea551449c5179f5001014d

    • SSDEEP

      3072:+q2AECtom0zK8YnYXBQW2xMuJSHoZWcsT:4+1gBlXO5rJSHY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks