General
-
Target
e8c96d07aa1162054101d870612e2b55_JaffaCakes118
-
Size
97KB
-
Sample
241212-3glwwa1lbv
-
MD5
e8c96d07aa1162054101d870612e2b55
-
SHA1
1cb99d6fb6344555234fba358cfcd71c24bd4a4b
-
SHA256
df62fa5e482d9140017c15da324c72a856c1a4ae2cc3e6f2423cf614a8223ad7
-
SHA512
5a19300cb454ab7576b432b0f89b2043fb42d71088f4d6bf3f914e770c0e36a86e452d75dee734130bc40c944c5670a8b0b82ff0704c97eb86d0df75e565c46b
-
SSDEEP
1536:JdmIfDMPllTjO+fU2Fbu1gHtzGXOd9KKICetCu/jE2fXZ8tpKCIKXF+3C9t+:JdmzBjOPqa2HtqXO/C2CjE
Static task
static1
Behavioral task
behavioral1
Sample
e8c96d07aa1162054101d870612e2b55_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e8c96d07aa1162054101d870612e2b55_JaffaCakes118
-
Size
97KB
-
MD5
e8c96d07aa1162054101d870612e2b55
-
SHA1
1cb99d6fb6344555234fba358cfcd71c24bd4a4b
-
SHA256
df62fa5e482d9140017c15da324c72a856c1a4ae2cc3e6f2423cf614a8223ad7
-
SHA512
5a19300cb454ab7576b432b0f89b2043fb42d71088f4d6bf3f914e770c0e36a86e452d75dee734130bc40c944c5670a8b0b82ff0704c97eb86d0df75e565c46b
-
SSDEEP
1536:JdmIfDMPllTjO+fU2Fbu1gHtzGXOd9KKICetCu/jE2fXZ8tpKCIKXF+3C9t+:JdmzBjOPqa2HtqXO/C2CjE
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5