General
-
Target
d261202ff709ce8e1598ea127b4b90e7_JaffaCakes118
-
Size
100KB
-
Sample
241207-pb5vxaxlcj
-
MD5
d261202ff709ce8e1598ea127b4b90e7
-
SHA1
7a307c38e84e4ce914578aa3c1eab3763a053488
-
SHA256
3048c636c58b06cb53faa9629a43d664b8dedd30a421d9427eede362d05a00b7
-
SHA512
dcc2978746db79fc18fa810a8d8103137efe1a0cfdcc2c84e2808f3411c950ac28e5a4983343fee256f2fccd1a00c76346545a39ee24bce3301a18cd68b4876f
-
SSDEEP
1536:QxBzwQcY9UGtk89RG0hUq5itpoKj2g9tGMIySDu7j0/LEuYdo6U:Q3zAGTnUqiwQ89yS6v0/9Yd
Static task
static1
Behavioral task
behavioral1
Sample
d261202ff709ce8e1598ea127b4b90e7_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d261202ff709ce8e1598ea127b4b90e7_JaffaCakes118
-
Size
100KB
-
MD5
d261202ff709ce8e1598ea127b4b90e7
-
SHA1
7a307c38e84e4ce914578aa3c1eab3763a053488
-
SHA256
3048c636c58b06cb53faa9629a43d664b8dedd30a421d9427eede362d05a00b7
-
SHA512
dcc2978746db79fc18fa810a8d8103137efe1a0cfdcc2c84e2808f3411c950ac28e5a4983343fee256f2fccd1a00c76346545a39ee24bce3301a18cd68b4876f
-
SSDEEP
1536:QxBzwQcY9UGtk89RG0hUq5itpoKj2g9tGMIySDu7j0/LEuYdo6U:Q3zAGTnUqiwQ89yS6v0/9Yd
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5