General
-
Target
144c18b4acc5cb968b8ac7f974a89f30f941e534159228c7bfbd45bbd838d2f9
-
Size
96KB
-
Sample
241122-l3rwksymaw
-
MD5
32486fb6fc161fd4fb75771465ad3e23
-
SHA1
94c61ac9a4a7e24414b4292cc6b77934eb934ce2
-
SHA256
144c18b4acc5cb968b8ac7f974a89f30f941e534159228c7bfbd45bbd838d2f9
-
SHA512
deedf6d51855cc4e63eb7efc9c1d3a5180921a1c955cb3baf786631e4245ac3b4d1eccef134d6eab92f7c33a8f968286931b2c1b743171c54f77403d460e1731
-
SSDEEP
1536:/u63rK0QDIy6CjIYo4xU3G/mBBTsBKyKIq0379Wrv1TxWnl3erzNLzPf/Hf9tszh:p3yxU3G/mBBsBn9qa7EKnkHNLb/bsRJl
Static task
static1
Behavioral task
behavioral1
Sample
144c18b4acc5cb968b8ac7f974a89f30f941e534159228c7bfbd45bbd838d2f9.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
144c18b4acc5cb968b8ac7f974a89f30f941e534159228c7bfbd45bbd838d2f9
-
Size
96KB
-
MD5
32486fb6fc161fd4fb75771465ad3e23
-
SHA1
94c61ac9a4a7e24414b4292cc6b77934eb934ce2
-
SHA256
144c18b4acc5cb968b8ac7f974a89f30f941e534159228c7bfbd45bbd838d2f9
-
SHA512
deedf6d51855cc4e63eb7efc9c1d3a5180921a1c955cb3baf786631e4245ac3b4d1eccef134d6eab92f7c33a8f968286931b2c1b743171c54f77403d460e1731
-
SSDEEP
1536:/u63rK0QDIy6CjIYo4xU3G/mBBTsBKyKIq0379Wrv1TxWnl3erzNLzPf/Hf9tszh:p3yxU3G/mBBsBn9qa7EKnkHNLb/bsRJl
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5