General
-
Target
6d1aa367de4adbff9ac678eff5201c8a2499ea0196cda26402c1b3752ae67ff4
-
Size
260KB
-
Sample
241203-yx4dms1rfy
-
MD5
2155e8932cb2a021cbb1a8a83bd716d7
-
SHA1
b740e33c738f8a3d9c67518862e53c31775fdc2c
-
SHA256
6d1aa367de4adbff9ac678eff5201c8a2499ea0196cda26402c1b3752ae67ff4
-
SHA512
9b6bc61992282fd3c32d6e87a43f0a96c1079ea7147a0f1324aeb6e24efe4d039ecf0286d08377e2acddece29cd435098f8ba4d45a9c5af11c993b6026cf15a3
-
SSDEEP
1536:J9Q8vHrjjAh4OEUSQ05ffffffffffffff9fffffffffffffftSp2K4JOwjkTn6Bk:zQ8vLZOEu0OSAkMOsTuBi3zJPvt/
Static task
static1
Behavioral task
behavioral1
Sample
6d1aa367de4adbff9ac678eff5201c8a2499ea0196cda26402c1b3752ae67ff4.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6d1aa367de4adbff9ac678eff5201c8a2499ea0196cda26402c1b3752ae67ff4
-
Size
260KB
-
MD5
2155e8932cb2a021cbb1a8a83bd716d7
-
SHA1
b740e33c738f8a3d9c67518862e53c31775fdc2c
-
SHA256
6d1aa367de4adbff9ac678eff5201c8a2499ea0196cda26402c1b3752ae67ff4
-
SHA512
9b6bc61992282fd3c32d6e87a43f0a96c1079ea7147a0f1324aeb6e24efe4d039ecf0286d08377e2acddece29cd435098f8ba4d45a9c5af11c993b6026cf15a3
-
SSDEEP
1536:J9Q8vHrjjAh4OEUSQ05ffffffffffffff9fffffffffffffftSp2K4JOwjkTn6Bk:zQ8vLZOEu0OSAkMOsTuBi3zJPvt/
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5