General
-
Target
c6aed29348a713c1d881aa5e2569c55b_JaffaCakes118
-
Size
119KB
-
Sample
241205-jrd48s1nar
-
MD5
c6aed29348a713c1d881aa5e2569c55b
-
SHA1
0bc55994c9c190e14eba868c55242e6496242d67
-
SHA256
f127f23e174f62af4a68dbf1769ebf6c18300141de592a280a2cae0717e025de
-
SHA512
791fc85ebb562f3d8a8c3be6bd44f9b62527148b70921f62dfedd1d51bf447c2781be7e2ae5b68e118b030821569978bb818245abca58dc1b874c268313deb7e
-
SSDEEP
3072:3oJ4rfA/OR4pyOu38nENOS9tZv22arhNpgf46e3yHMd:344ro2R4AOu38ENJrB2RQ4YHy
Static task
static1
Behavioral task
behavioral1
Sample
desktopV1/desktopV1.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
desktopV1/desktopV1.exe
-
Size
209KB
-
MD5
5fe2a0054bd67a4724902f4503bab17c
-
SHA1
69e9d8adb9d5081c54d4222954e406ba06eea64c
-
SHA256
0ebe153928a390344cbcece1894596756c28afc965723d249a1b60b0d3b16ce2
-
SHA512
2be66ae89fa4e5de138025b796fd9301fee9a4ad7337853322a8e76a3cc9d1f6e7de9cef7432507290c25da61cae8146582228e137a2e20e4749723aa912d7db
-
SSDEEP
3072:+WzhM5bTxzSx5XRBxQ+y2TgBu3CDwaTjrvM7vLhjIafC3Xa5:+WlMpTJqeMgf/T/cJ1
-
Modifies firewall policy service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5