General
-
Target
JaffaCakes118_9e6c22af0433a806517fafc0e83e1574
-
Size
194KB
-
Sample
250205-lyd4xssqcr
-
MD5
9e6c22af0433a806517fafc0e83e1574
-
SHA1
1c9bb427aa29e8be2c4258bc1393fed578841172
-
SHA256
dff10f255546c9373ba738c152c10251460ccd5212020aa8fa9cdf87b4eab0cc
-
SHA512
2136c548e24a2f0f316a97d21504e94b5c9057188546819ac5006c075537c90513c7deb389fd2273f2096aa80bc32be1c2d5c8e9ef86b670ef579d341123933c
-
SSDEEP
6144:WtvtJ4Xma2TbglDyIlIAfgSt4KO2iWiWsV:WtLTbsJIOOKOXcq
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9e6c22af0433a806517fafc0e83e1574.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9e6c22af0433a806517fafc0e83e1574.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_9e6c22af0433a806517fafc0e83e1574
-
Size
194KB
-
MD5
9e6c22af0433a806517fafc0e83e1574
-
SHA1
1c9bb427aa29e8be2c4258bc1393fed578841172
-
SHA256
dff10f255546c9373ba738c152c10251460ccd5212020aa8fa9cdf87b4eab0cc
-
SHA512
2136c548e24a2f0f316a97d21504e94b5c9057188546819ac5006c075537c90513c7deb389fd2273f2096aa80bc32be1c2d5c8e9ef86b670ef579d341123933c
-
SSDEEP
6144:WtvtJ4Xma2TbglDyIlIAfgSt4KO2iWiWsV:WtLTbsJIOOKOXcq
-
Sality family
-
UAC bypass
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3