General
-
Target
66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0
-
Size
2.1MB
-
Sample
241203-y2xrnaxnhj
-
MD5
23dc9037e637780575a1b87fb3d49489
-
SHA1
b1c9e8f8ebef84adca575f0b82c3664a905e1794
-
SHA256
66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0
-
SHA512
bb516798b6d30d88e4f1d5d0932a5dc5b7f6b2bef3357e5ae4ed9847fd58eb5a7e6999cefbe8623656620fc7d98f9e379bcec3959bc142fd15ed3656fd37f498
-
SSDEEP
49152:wzME8KgmwI/NMCeOblTVVA0zieRtqIXSD4/:wMEVwENMCeOblTVVA+iefqIXSDy
Static task
static1
Behavioral task
behavioral1
Sample
66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0
-
Size
2.1MB
-
MD5
23dc9037e637780575a1b87fb3d49489
-
SHA1
b1c9e8f8ebef84adca575f0b82c3664a905e1794
-
SHA256
66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0
-
SHA512
bb516798b6d30d88e4f1d5d0932a5dc5b7f6b2bef3357e5ae4ed9847fd58eb5a7e6999cefbe8623656620fc7d98f9e379bcec3959bc142fd15ed3656fd37f498
-
SSDEEP
49152:wzME8KgmwI/NMCeOblTVVA0zieRtqIXSD4/:wMEVwENMCeOblTVVA+iefqIXSDy
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5