General
-
Target
d6a8aa58b299c6a0199896a6414466e6_JaffaCakes118
-
Size
97KB
-
Sample
241208-mwqwda1nbt
-
MD5
d6a8aa58b299c6a0199896a6414466e6
-
SHA1
26570f33d20a2f0d2703b53aa674303ccbfd1f29
-
SHA256
a8dc98b7895e79af5a166e4871ec0e31804b5251d0141521c8747c1b49f62701
-
SHA512
6ddf40126c47b2a0d1b4e231920df4dbfe606d375e5300b49cec8b979eb251b790bb0581c32a2c4916fcd82ed7459d04be6c1c501fe371d40d7acf8778aff1ee
-
SSDEEP
1536:jiB2ySgJ9DHuIqvBHYhgOwWq+lJmnYET1itZ4fkzok9bSizbcd4/:GBdB/iRvB4DU+lYYEJiTBRPzgd
Static task
static1
Behavioral task
behavioral1
Sample
d6a8aa58b299c6a0199896a6414466e6_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d6a8aa58b299c6a0199896a6414466e6_JaffaCakes118
-
Size
97KB
-
MD5
d6a8aa58b299c6a0199896a6414466e6
-
SHA1
26570f33d20a2f0d2703b53aa674303ccbfd1f29
-
SHA256
a8dc98b7895e79af5a166e4871ec0e31804b5251d0141521c8747c1b49f62701
-
SHA512
6ddf40126c47b2a0d1b4e231920df4dbfe606d375e5300b49cec8b979eb251b790bb0581c32a2c4916fcd82ed7459d04be6c1c501fe371d40d7acf8778aff1ee
-
SSDEEP
1536:jiB2ySgJ9DHuIqvBHYhgOwWq+lJmnYET1itZ4fkzok9bSizbcd4/:GBdB/iRvB4DU+lYYEJiTBRPzgd
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5