General
-
Target
JaffaCakes118_b3e1ae9fe1b23a753b8c47a95a72cf87
-
Size
282KB
-
Sample
250207-gy6fys1rcw
-
MD5
b3e1ae9fe1b23a753b8c47a95a72cf87
-
SHA1
39a50ae818bd076bf904c8a9043b318ad335bfbb
-
SHA256
7cf978cfdc2741c4defb2caefa30f53f2314585619044211eaa588921e88097b
-
SHA512
98754682bb6bdc816e2c8e6e7f7028409c3fde1dd918eefbebd1aef2f177babb337fb9db5530725446d00fab154fe556a2a1513def7498fd7d104045c7b6645c
-
SSDEEP
3072:Cpw+IEitDzUKwCX0k0DJVxPoUNHGN850T6W:2ME88HDPNyT
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b3e1ae9fe1b23a753b8c47a95a72cf87.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_b3e1ae9fe1b23a753b8c47a95a72cf87.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
JaffaCakes118_b3e1ae9fe1b23a753b8c47a95a72cf87
-
Size
282KB
-
MD5
b3e1ae9fe1b23a753b8c47a95a72cf87
-
SHA1
39a50ae818bd076bf904c8a9043b318ad335bfbb
-
SHA256
7cf978cfdc2741c4defb2caefa30f53f2314585619044211eaa588921e88097b
-
SHA512
98754682bb6bdc816e2c8e6e7f7028409c3fde1dd918eefbebd1aef2f177babb337fb9db5530725446d00fab154fe556a2a1513def7498fd7d104045c7b6645c
-
SSDEEP
3072:Cpw+IEitDzUKwCX0k0DJVxPoUNHGN850T6W:2ME88HDPNyT
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Windows security modification
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
4