General
-
Target
JaffaCakes118_4f4314a98a089a3a038771f5e2ba031e
-
Size
100KB
-
Sample
250101-k4kyzstjgn
-
MD5
4f4314a98a089a3a038771f5e2ba031e
-
SHA1
76bf6ef3afbd6a10a6bbb93f62b86df1cdcb6670
-
SHA256
25cae62f3aa6ffe655c0db643c2dd991f2b0f2f13765e101760166efb5553bdc
-
SHA512
d0296ddb2f11e88747016bce5e365693de5d018630b689574a7ee91dd31d27dfe1eb731702329d59ecefc1ffd0441691e1abbb61d622ce2442f06d464d6601c6
-
SSDEEP
1536:z17qiB+HJwz3Df4bv1ThRjG92vWy8PsWZ5E7nBLSSloiccjBB:ZB+p049hI2vX8PDVSq9ST
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4f4314a98a089a3a038771f5e2ba031e.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_4f4314a98a089a3a038771f5e2ba031e
-
Size
100KB
-
MD5
4f4314a98a089a3a038771f5e2ba031e
-
SHA1
76bf6ef3afbd6a10a6bbb93f62b86df1cdcb6670
-
SHA256
25cae62f3aa6ffe655c0db643c2dd991f2b0f2f13765e101760166efb5553bdc
-
SHA512
d0296ddb2f11e88747016bce5e365693de5d018630b689574a7ee91dd31d27dfe1eb731702329d59ecefc1ffd0441691e1abbb61d622ce2442f06d464d6601c6
-
SSDEEP
1536:z17qiB+HJwz3Df4bv1ThRjG92vWy8PsWZ5E7nBLSSloiccjBB:ZB+p049hI2vX8PDVSq9ST
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5