General
-
Target
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
-
Size
1.2MB
-
Sample
241203-y4dfssxpep
-
MD5
7ff52acf2b53d2b5a53b4fca405b3e78
-
SHA1
8c740dbb941aaa5af7addceca34e73cd41fc28d6
-
SHA256
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
-
SHA512
5f54ec667b1c0b578858aea83c793a03adec3323a49ddaf6465cfbd2cd8583ef16a94db82ec1c139603d41b66ed05c1fd817aabf7f5a91c2ce68459ceccaae87
-
SSDEEP
24576:catIvCEBXufFWij4EBbjQjcKIzs2JhoYQwORdYJK4NXJVz:wXwHpcszs2LQ3RCI43Vz
Static task
static1
Behavioral task
behavioral1
Sample
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
-
Size
1.2MB
-
MD5
7ff52acf2b53d2b5a53b4fca405b3e78
-
SHA1
8c740dbb941aaa5af7addceca34e73cd41fc28d6
-
SHA256
63991f91c8e6a0ea4bb20431fa6f11e5a80b52fc0e4a33a109bfb547c001f9e3
-
SHA512
5f54ec667b1c0b578858aea83c793a03adec3323a49ddaf6465cfbd2cd8583ef16a94db82ec1c139603d41b66ed05c1fd817aabf7f5a91c2ce68459ceccaae87
-
SSDEEP
24576:catIvCEBXufFWij4EBbjQjcKIzs2JhoYQwORdYJK4NXJVz:wXwHpcszs2LQ3RCI43Vz
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5