General
-
Target
dba6a61dd497b4d4f67f4dbcb2233f67_JaffaCakes118
-
Size
100KB
-
Sample
241209-1fqgkaskez
-
MD5
dba6a61dd497b4d4f67f4dbcb2233f67
-
SHA1
9158cb8975027cd9badd646f70f154f633b097d0
-
SHA256
3c94ade0641b50b01a1afb3938e3b32d8039fd88153586d60f015c6431ab980e
-
SHA512
623a3c3cff00bc18cfd90511d9b1354511ee9e0bce23fe113812abe6a11ec01f9a20708688268827740d534cc5dea3675311b3b052f9df5cfb0d5bdd4aa51b6d
-
SSDEEP
1536:0JweEtxfWU73iIy70BtUFx+rUrDY5B1L7aT69RPFCVSn+uGaGSJcxgO3B08:wEtPy7qUFx+rUrDG9tCVSn+oGSS3u
Static task
static1
Behavioral task
behavioral1
Sample
dba6a61dd497b4d4f67f4dbcb2233f67_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
dba6a61dd497b4d4f67f4dbcb2233f67_JaffaCakes118
-
Size
100KB
-
MD5
dba6a61dd497b4d4f67f4dbcb2233f67
-
SHA1
9158cb8975027cd9badd646f70f154f633b097d0
-
SHA256
3c94ade0641b50b01a1afb3938e3b32d8039fd88153586d60f015c6431ab980e
-
SHA512
623a3c3cff00bc18cfd90511d9b1354511ee9e0bce23fe113812abe6a11ec01f9a20708688268827740d534cc5dea3675311b3b052f9df5cfb0d5bdd4aa51b6d
-
SSDEEP
1536:0JweEtxfWU73iIy70BtUFx+rUrDY5B1L7aT69RPFCVSn+uGaGSJcxgO3B08:wEtPy7qUFx+rUrDG9tCVSn+oGSS3u
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5