General
-
Target
ef77f0357f858ce27d8fa254df8ade6a_JaffaCakes118
-
Size
96KB
-
Sample
241214-s1ftvswpcv
-
MD5
ef77f0357f858ce27d8fa254df8ade6a
-
SHA1
fad4d31884e6ec3f36603f7ff90fd8973ffbb617
-
SHA256
b6a07b3ff5ccb2a78f6fbeaa096131ed61c42abf1b1db0866ddab3c33f8504d1
-
SHA512
8833443bbcec79525026758bd01fc9c7fb7407df70b860bd0b1ed63dce925b0c4a68f2986e7d6629e9f89626c5447778c378df492c0724a862cb31dd06adb70f
-
SSDEEP
3072:TBzZh7CTDOUF63YlCzn5VpBILN0Aj2VP0:TB6/XYLRE0qj
Static task
static1
Behavioral task
behavioral1
Sample
ef77f0357f858ce27d8fa254df8ade6a_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
ef77f0357f858ce27d8fa254df8ade6a_JaffaCakes118
-
Size
96KB
-
MD5
ef77f0357f858ce27d8fa254df8ade6a
-
SHA1
fad4d31884e6ec3f36603f7ff90fd8973ffbb617
-
SHA256
b6a07b3ff5ccb2a78f6fbeaa096131ed61c42abf1b1db0866ddab3c33f8504d1
-
SHA512
8833443bbcec79525026758bd01fc9c7fb7407df70b860bd0b1ed63dce925b0c4a68f2986e7d6629e9f89626c5447778c378df492c0724a862cb31dd06adb70f
-
SSDEEP
3072:TBzZh7CTDOUF63YlCzn5VpBILN0Aj2VP0:TB6/XYLRE0qj
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5