General
-
Target
dd89ae706cce2e5c18816728ce593ed6_JaffaCakes118
-
Size
234KB
-
Sample
241210-hr2pvsspbp
-
MD5
dd89ae706cce2e5c18816728ce593ed6
-
SHA1
3fc433c4f0cf09e4345ad1151bb3c0c7844edc8c
-
SHA256
947a93607a9633e87a3f29031c5ca466655d4823275b7032d432a1e4e1e1d7a0
-
SHA512
3d772d620a286668023d757637d2ebb4b1ca308932ad65c8a28e0fb72d27c6d7c918c0f1dcb3cb1b4ea47000fc115dc4c58b0cc37cd7850fdb1e1cb46171fdd2
-
SSDEEP
3072:enz2z/jMwe81co9+qol6WhHAUDBtY4Lpd6x/mP/Yirz1YPAS7BPOoutFc:Vz/x+SWqQtY4Lpd6Vq/hvsd9POoutFc
Static task
static1
Behavioral task
behavioral1
Sample
dd89ae706cce2e5c18816728ce593ed6_JaffaCakes118.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
dd89ae706cce2e5c18816728ce593ed6_JaffaCakes118
-
Size
234KB
-
MD5
dd89ae706cce2e5c18816728ce593ed6
-
SHA1
3fc433c4f0cf09e4345ad1151bb3c0c7844edc8c
-
SHA256
947a93607a9633e87a3f29031c5ca466655d4823275b7032d432a1e4e1e1d7a0
-
SHA512
3d772d620a286668023d757637d2ebb4b1ca308932ad65c8a28e0fb72d27c6d7c918c0f1dcb3cb1b4ea47000fc115dc4c58b0cc37cd7850fdb1e1cb46171fdd2
-
SSDEEP
3072:enz2z/jMwe81co9+qol6WhHAUDBtY4Lpd6x/mP/Yirz1YPAS7BPOoutFc:Vz/x+SWqQtY4Lpd6Vq/hvsd9POoutFc
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5