General
-
Target
d6ab377d4ca4ce354cc8e2e24b294264_JaffaCakes118
-
Size
100KB
-
Sample
241208-mxngms1ndw
-
MD5
d6ab377d4ca4ce354cc8e2e24b294264
-
SHA1
0583d4549ebe2d668c8373e190307ad0f9c8f162
-
SHA256
e9df88f6cec6217a8e78990a01e9964d599f44f351b11118d41c065ea3b3cfe7
-
SHA512
fe5a290a6d094c3e22fe9a2cc970f70f7503cb56c1485755b5a97817ddcae7c569707d914923257c1f83e42cd6e64332972af47964324ca80675c4954040e633
-
SSDEEP
1536:mCLNdzPoMBF9uNy43NrpNnn+mpjyTug63bCxvO2g9IGrjt4L2+mhGnDC+:muPo497435n+94bCxG2g9IymJmEnW+
Static task
static1
Behavioral task
behavioral1
Sample
d6ab377d4ca4ce354cc8e2e24b294264_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
d6ab377d4ca4ce354cc8e2e24b294264_JaffaCakes118
-
Size
100KB
-
MD5
d6ab377d4ca4ce354cc8e2e24b294264
-
SHA1
0583d4549ebe2d668c8373e190307ad0f9c8f162
-
SHA256
e9df88f6cec6217a8e78990a01e9964d599f44f351b11118d41c065ea3b3cfe7
-
SHA512
fe5a290a6d094c3e22fe9a2cc970f70f7503cb56c1485755b5a97817ddcae7c569707d914923257c1f83e42cd6e64332972af47964324ca80675c4954040e633
-
SSDEEP
1536:mCLNdzPoMBF9uNy43NrpNnn+mpjyTug63bCxvO2g9IGrjt4L2+mhGnDC+:muPo497435n+94bCxG2g9IymJmEnW+
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5