General
-
Target
efb3fe132bc9f29dc66c68ddd5199897_JaffaCakes118
-
Size
100KB
-
Sample
241214-t5kt2szlep
-
MD5
efb3fe132bc9f29dc66c68ddd5199897
-
SHA1
23681113dcf202e5b3c5a40ab803b6890ab254fa
-
SHA256
48469e20360cb6569f933232eef8c4a0ce4e18146a175ae8525752d87f5c1398
-
SHA512
0ad6a281876876622b96acdc1b302cf12664d26b7775b79a4a96de6400da2972263f18487872c00fc1442e5c58ea45b305e100d1bd41509b1f63288da76400e4
-
SSDEEP
1536:FFJ9UjIovLkAdAdjGhbpCJ5eB0+WRuWWGoaKuxvKYdwGez6lGctdrFZ:XwHvLk/lcAiiuWWMKuxC38ztvZ
Static task
static1
Behavioral task
behavioral1
Sample
efb3fe132bc9f29dc66c68ddd5199897_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
efb3fe132bc9f29dc66c68ddd5199897_JaffaCakes118
-
Size
100KB
-
MD5
efb3fe132bc9f29dc66c68ddd5199897
-
SHA1
23681113dcf202e5b3c5a40ab803b6890ab254fa
-
SHA256
48469e20360cb6569f933232eef8c4a0ce4e18146a175ae8525752d87f5c1398
-
SHA512
0ad6a281876876622b96acdc1b302cf12664d26b7775b79a4a96de6400da2972263f18487872c00fc1442e5c58ea45b305e100d1bd41509b1f63288da76400e4
-
SSDEEP
1536:FFJ9UjIovLkAdAdjGhbpCJ5eB0+WRuWWGoaKuxvKYdwGez6lGctdrFZ:XwHvLk/lcAiiuWWMKuxC38ztvZ
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5