General
-
Target
ca1e845b0c718139f4b0d96793c3940e7f32e522a7c9b16650d904285be04d3e
-
Size
1.3MB
-
Sample
241103-jrnnnsylgs
-
MD5
0103acacb57898f449e78c1844614ef4
-
SHA1
a06578209e5d13895fc191a66724f447e81bb87a
-
SHA256
ca1e845b0c718139f4b0d96793c3940e7f32e522a7c9b16650d904285be04d3e
-
SHA512
da30d3db6c77e43f23b300e1b195f66088e90547443a1e0093926e0e45d4ee5ef47297ab23eae1d34bf38397445424564cf080d8e55bca9a5c8b56594c9c2f08
-
SSDEEP
24576:Tv827aINkTWCcQ/H5Nlbu5lbWiVAzMQa4LnXQ9dTFW/GYjD2I8uvyu1ias1Pycrl:TvC2eBXYaGWD2xwRrQycrEo
Static task
static1
Behavioral task
behavioral1
Sample
ca1e845b0c718139f4b0d96793c3940e7f32e522a7c9b16650d904285be04d3e.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
metasploit
windows/download_exec
http://59.110.172.50:80/cmX4
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; NP07; NP07)
Targets
-
-
Target
ca1e845b0c718139f4b0d96793c3940e7f32e522a7c9b16650d904285be04d3e
-
Size
1.3MB
-
MD5
0103acacb57898f449e78c1844614ef4
-
SHA1
a06578209e5d13895fc191a66724f447e81bb87a
-
SHA256
ca1e845b0c718139f4b0d96793c3940e7f32e522a7c9b16650d904285be04d3e
-
SHA512
da30d3db6c77e43f23b300e1b195f66088e90547443a1e0093926e0e45d4ee5ef47297ab23eae1d34bf38397445424564cf080d8e55bca9a5c8b56594c9c2f08
-
SSDEEP
24576:Tv827aINkTWCcQ/H5Nlbu5lbWiVAzMQa4LnXQ9dTFW/GYjD2I8uvyu1ias1Pycrl:TvC2eBXYaGWD2xwRrQycrEo
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5