General
-
Target
bd9800311080c92564b2045388791c0c_JaffaCakes118
-
Size
120KB
-
Sample
241203-qpb1esspcj
-
MD5
bd9800311080c92564b2045388791c0c
-
SHA1
58206f82b2547828b149f0336a6026cc382ca9b7
-
SHA256
c507784f9e061de65b8e1e572f85733c0362c4d9ac2ca0a31eb22342a0517403
-
SHA512
a6693b7398d43f622fbca0488afbda7e76ad71f644b20b45d182ca377255a149b2268e40bba03e69ce015e2b786294be5abbd076c3543c06bf3ec6abf4765fd9
-
SSDEEP
3072:NCNnXwFNIklcAKRQtmUmPSmuG1JkNeCUV/:NCNXwFj5KO+SmuGbkNx
Static task
static1
Behavioral task
behavioral1
Sample
bd9800311080c92564b2045388791c0c_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bd9800311080c92564b2045388791c0c_JaffaCakes118
-
Size
120KB
-
MD5
bd9800311080c92564b2045388791c0c
-
SHA1
58206f82b2547828b149f0336a6026cc382ca9b7
-
SHA256
c507784f9e061de65b8e1e572f85733c0362c4d9ac2ca0a31eb22342a0517403
-
SHA512
a6693b7398d43f622fbca0488afbda7e76ad71f644b20b45d182ca377255a149b2268e40bba03e69ce015e2b786294be5abbd076c3543c06bf3ec6abf4765fd9
-
SSDEEP
3072:NCNnXwFNIklcAKRQtmUmPSmuG1JkNeCUV/:NCNXwFj5KO+SmuGbkNx
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5