General

  • Target

    1c3bec8f51b1e13546b43bcb263728a8_JaffaCakes118

  • Size

    167KB

  • Sample

    240701-x7nkhaygpl

  • MD5

    1c3bec8f51b1e13546b43bcb263728a8

  • SHA1

    1c50fb713aeb60f8ac9752659f115170e2647d2f

  • SHA256

    214f9daf64d67f7813713251d6a86285de4dc3197f442e9eb665698e50c0e53c

  • SHA512

    746c55d87c3938c4bb2b1fb67247a3f106dd0cb605fee7f82033c60c8c1fc3d92d098713c992fcc34c04216a29aca72d7afec701321ff6361306e7f1a4076160

  • SSDEEP

    3072:zNQKPWDyXRegJltZrpRZ71iccU7BkD+IqozWO48:zNSDyXRxthpcccUlkD1q4D

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1c3bec8f51b1e13546b43bcb263728a8_JaffaCakes118

    • Size

      167KB

    • MD5

      1c3bec8f51b1e13546b43bcb263728a8

    • SHA1

      1c50fb713aeb60f8ac9752659f115170e2647d2f

    • SHA256

      214f9daf64d67f7813713251d6a86285de4dc3197f442e9eb665698e50c0e53c

    • SHA512

      746c55d87c3938c4bb2b1fb67247a3f106dd0cb605fee7f82033c60c8c1fc3d92d098713c992fcc34c04216a29aca72d7afec701321ff6361306e7f1a4076160

    • SSDEEP

      3072:zNQKPWDyXRegJltZrpRZ71iccU7BkD+IqozWO48:zNSDyXRxthpcccUlkD1q4D

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Tasks