Resubmissions
25-01-2025 21:22
250125-z7wl8azrfv 10General
-
Target
JaffaCakes118_2fc1ecad8ba5296db52d08df27c5f253
-
Size
127KB
-
Sample
250125-z7wl8azrfv
-
MD5
2fc1ecad8ba5296db52d08df27c5f253
-
SHA1
9a25eefc15bb50ba3ee8a6a97116ebeb1d809123
-
SHA256
8ebb321206ac0c7048fcc877d0a7541ed365cb1c6bfaef9c8a35dedf1031ec77
-
SHA512
b6778089ecabe33e989aa8fb80bf56cef4ea980f3165f2c96d135397c6d0882e23fadf86f956c4fd522058cebe47daaf56a694eb77f74eb95ccc188bfc815c6f
-
SSDEEP
3072:l/a1XiUHOBGCXu+QTDXugOU3C2CB2YmRI0ah:l/mrHOBunVOGCBNmR0h
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2fc1ecad8ba5296db52d08df27c5f253.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_2fc1ecad8ba5296db52d08df27c5f253
-
Size
127KB
-
MD5
2fc1ecad8ba5296db52d08df27c5f253
-
SHA1
9a25eefc15bb50ba3ee8a6a97116ebeb1d809123
-
SHA256
8ebb321206ac0c7048fcc877d0a7541ed365cb1c6bfaef9c8a35dedf1031ec77
-
SHA512
b6778089ecabe33e989aa8fb80bf56cef4ea980f3165f2c96d135397c6d0882e23fadf86f956c4fd522058cebe47daaf56a694eb77f74eb95ccc188bfc815c6f
-
SSDEEP
3072:l/a1XiUHOBGCXu+QTDXugOU3C2CB2YmRI0ah:l/mrHOBunVOGCBNmR0h
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5