General
-
Target
JaffaCakes118_9aad18c8ea9583e058389b4fb6ffd5a7
-
Size
100KB
-
Sample
250405-qp8pdsxvax
-
MD5
9aad18c8ea9583e058389b4fb6ffd5a7
-
SHA1
f5969c60dacb2fc7a088d0acaadcede60e6ad57e
-
SHA256
fd6c70f0e88b9adb598a07492597ddec8d154c8eda65c21a8fd4700e9893a9f1
-
SHA512
67f6b03525d5f62f3ef0ac1fa0411f7de57ecebde33fe00bc5afb70c4e7737e2f345d8f5e972a76f4f0ca7ccd53707d9fedf8979a3c499eaebf557f3cf04c8bb
-
SSDEEP
1536:q4pVe3/YjoCBSvALIagpB1aBK8hXvoUS9wV1560TOkA8NnB8UY4OJlxfhHPPZ:Ow0C7BgpvoK8h/oXu18MJXR+JPFPP
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
JaffaCakes118_9aad18c8ea9583e058389b4fb6ffd5a7
-
Size
100KB
-
MD5
9aad18c8ea9583e058389b4fb6ffd5a7
-
SHA1
f5969c60dacb2fc7a088d0acaadcede60e6ad57e
-
SHA256
fd6c70f0e88b9adb598a07492597ddec8d154c8eda65c21a8fd4700e9893a9f1
-
SHA512
67f6b03525d5f62f3ef0ac1fa0411f7de57ecebde33fe00bc5afb70c4e7737e2f345d8f5e972a76f4f0ca7ccd53707d9fedf8979a3c499eaebf557f3cf04c8bb
-
SSDEEP
1536:q4pVe3/YjoCBSvALIagpB1aBK8hXvoUS9wV1560TOkA8NnB8UY4OJlxfhHPPZ:Ow0C7BgpvoK8h/oXu18MJXR+JPFPP
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5