General
-
Target
20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9
-
Size
116KB
-
Sample
241122-m9nceazjev
-
MD5
521cbe25dfee2700b78e9e806eb7d7f1
-
SHA1
0542806453c9d08800aa4ad62191259d6f1517c1
-
SHA256
20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9
-
SHA512
74df7e3cf1772b72209c82d98e7b056616f165e835ed96d3e5e156ad0e943e17a8092172075c5ae3b7ba9b0384862b9323b582ca0bc71f931403aa9b16f049a9
-
SSDEEP
3072:JYK60a3KAlQq8wcRBongM7JRgSnGi+qbu4iZV:J/60At8wcXog4JRg5T4E
Static task
static1
Behavioral task
behavioral1
Sample
20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9
-
Size
116KB
-
MD5
521cbe25dfee2700b78e9e806eb7d7f1
-
SHA1
0542806453c9d08800aa4ad62191259d6f1517c1
-
SHA256
20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9
-
SHA512
74df7e3cf1772b72209c82d98e7b056616f165e835ed96d3e5e156ad0e943e17a8092172075c5ae3b7ba9b0384862b9323b582ca0bc71f931403aa9b16f049a9
-
SSDEEP
3072:JYK60a3KAlQq8wcRBongM7JRgSnGi+qbu4iZV:J/60At8wcXog4JRg5T4E
-
Modifies firewall policy service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5