General
-
Target
JaffaCakes118_9a8f7f151b3a8bbb9aea3b1e7c9d9b4c
-
Size
100KB
-
Sample
250405-plvspaymw7
-
MD5
9a8f7f151b3a8bbb9aea3b1e7c9d9b4c
-
SHA1
62e785bb0b924ada6eb98d0fc19721f28381f69f
-
SHA256
175b6de7f0b1ca376d506c1e643cf289562efeab460ee99279c38ae2bffbf873
-
SHA512
22686f9737c4f8c4de5a58801576aa99b19ca14e2888a78cf321a01dccf7394210029be5b8a57500cbf0d7687d4a53f9f2d97a373751985a957b238178194675
-
SSDEEP
1536:Gu5KIHXev1bExAuy1jpbyuhI8N/F2u8GD4MhY8b6nN7p226RZ2kRL3XRzCv2z0qd:h5KIHXsOOJyMhFQb8b6nNl226btCU05
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9a8f7f151b3a8bbb9aea3b1e7c9d9b4c
-
Size
100KB
-
MD5
9a8f7f151b3a8bbb9aea3b1e7c9d9b4c
-
SHA1
62e785bb0b924ada6eb98d0fc19721f28381f69f
-
SHA256
175b6de7f0b1ca376d506c1e643cf289562efeab460ee99279c38ae2bffbf873
-
SHA512
22686f9737c4f8c4de5a58801576aa99b19ca14e2888a78cf321a01dccf7394210029be5b8a57500cbf0d7687d4a53f9f2d97a373751985a957b238178194675
-
SSDEEP
1536:Gu5KIHXev1bExAuy1jpbyuhI8N/F2u8GD4MhY8b6nN7p226RZ2kRL3XRzCv2z0qd:h5KIHXsOOJyMhFQb8b6nNl226btCU05
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5