General
-
Target
f396ba0eae21226cf8984be3954d198a_JaffaCakes118
-
Size
100KB
-
Sample
241215-mkezqstjer
-
MD5
f396ba0eae21226cf8984be3954d198a
-
SHA1
31b7c3bf2b0c6db071d89ecf9224e352ce83be7d
-
SHA256
d8873188ba4694f240c841d4af3463885b85816d7028be781cd12f77bd4aab28
-
SHA512
94edfe19a622781e98a4a0b79c811e57acd64c366c620fd6597bb191236a46e579eafe34a722ee50804fed0e886edeb899d66393017b425fc78dd16be485631c
-
SSDEEP
1536:AQorG6pe+MD8eQ/Ijk0aVCdXdvYG6KU/JgKJl7dB+JEOiuGsArAUwiMdB8dw9gR:Vordpe7RQ/IwpCdXd8z/RcOUcZMdywW
Static task
static1
Behavioral task
behavioral1
Sample
f396ba0eae21226cf8984be3954d198a_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f396ba0eae21226cf8984be3954d198a_JaffaCakes118
-
Size
100KB
-
MD5
f396ba0eae21226cf8984be3954d198a
-
SHA1
31b7c3bf2b0c6db071d89ecf9224e352ce83be7d
-
SHA256
d8873188ba4694f240c841d4af3463885b85816d7028be781cd12f77bd4aab28
-
SHA512
94edfe19a622781e98a4a0b79c811e57acd64c366c620fd6597bb191236a46e579eafe34a722ee50804fed0e886edeb899d66393017b425fc78dd16be485631c
-
SSDEEP
1536:AQorG6pe+MD8eQ/Ijk0aVCdXdvYG6KU/JgKJl7dB+JEOiuGsArAUwiMdB8dw9gR:Vordpe7RQ/IwpCdXd8z/RcOUcZMdywW
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5