General
-
Target
c3057861c7915463d36e422378377e6d_JaffaCakes118
-
Size
100KB
-
Sample
241204-r4alkstnej
-
MD5
c3057861c7915463d36e422378377e6d
-
SHA1
53810be064672215c70fa6e50b23bc69b672d3cf
-
SHA256
e03256b9e95334f8900c3bf5d90d2d8109896267f10054289665cc5dd7052070
-
SHA512
42ebca44a2edde194ae7fcdb37c193c444ec2ef0b87c87f5e126a66eabac650198ee3b476f522b991ea014a086482ad7a3809f3ca02f95745d57788c2d0c4798
-
SSDEEP
3072:0+Hx0MBJ9NcUC0miFBs4qzQxP7AlWar465b:0Sx0MH9NcZe7OQpsv06F
Static task
static1
Behavioral task
behavioral1
Sample
c3057861c7915463d36e422378377e6d_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
c3057861c7915463d36e422378377e6d_JaffaCakes118
-
Size
100KB
-
MD5
c3057861c7915463d36e422378377e6d
-
SHA1
53810be064672215c70fa6e50b23bc69b672d3cf
-
SHA256
e03256b9e95334f8900c3bf5d90d2d8109896267f10054289665cc5dd7052070
-
SHA512
42ebca44a2edde194ae7fcdb37c193c444ec2ef0b87c87f5e126a66eabac650198ee3b476f522b991ea014a086482ad7a3809f3ca02f95745d57788c2d0c4798
-
SSDEEP
3072:0+Hx0MBJ9NcUC0miFBs4qzQxP7AlWar465b:0Sx0MH9NcZe7OQpsv06F
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5