General
-
Target
JaffaCakes118_9aa74a84138a80796fb69dc391d38b5f
-
Size
100KB
-
Sample
250405-qdhc3aw1ex
-
MD5
9aa74a84138a80796fb69dc391d38b5f
-
SHA1
a95c2f2a0cbba0f0ac40b805168980984bfd4f0d
-
SHA256
d19be006c540c0f554aaa68fbaecdf5c54af973b31bb6482051544b628fceb37
-
SHA512
2c9286e1e60194d133076d0f54c1f34ee4b2afb6e1387457bbd285de933c7d086f526aca182f3d14cb59c0e2a85b1d3a051aa6f7fff09aa5fc78790dcef496b6
-
SSDEEP
1536:byHm6NNY9PnSHiRtGbKnOARdMr7Alo1mcb0OuZ/ybW2DUZfp:bsJWjRtu0lAmcy/8WP
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9aa74a84138a80796fb69dc391d38b5f
-
Size
100KB
-
MD5
9aa74a84138a80796fb69dc391d38b5f
-
SHA1
a95c2f2a0cbba0f0ac40b805168980984bfd4f0d
-
SHA256
d19be006c540c0f554aaa68fbaecdf5c54af973b31bb6482051544b628fceb37
-
SHA512
2c9286e1e60194d133076d0f54c1f34ee4b2afb6e1387457bbd285de933c7d086f526aca182f3d14cb59c0e2a85b1d3a051aa6f7fff09aa5fc78790dcef496b6
-
SSDEEP
1536:byHm6NNY9PnSHiRtGbKnOARdMr7Alo1mcb0OuZ/ybW2DUZfp:bsJWjRtu0lAmcy/8WP
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5