General
-
Target
adce1ec161d2536b534fe6c1ce4234815050ea2feb9dc14f48815cf9eebc9f42
-
Size
2.1MB
-
Sample
241203-yz2b3axmhj
-
MD5
489854b2db1ba5bda7c929dd810ed4a9
-
SHA1
e3c47bee88154648bff90459f12e8a301386df2b
-
SHA256
adce1ec161d2536b534fe6c1ce4234815050ea2feb9dc14f48815cf9eebc9f42
-
SHA512
92f823213b5c193ce508d93276c872680400c52f04ebc2f60c701216e60cf2a9bb03c561a189fecd7aeba2f183507b59568bec06c3388aaae125063dc67619d8
-
SSDEEP
49152:6zME8KgmwI/NMCeOblTVVA0zTeRtqIXSD4ZSG:GMEVwENMCeOblTVVA+TefqIXSDkSG
Static task
static1
Behavioral task
behavioral1
Sample
adce1ec161d2536b534fe6c1ce4234815050ea2feb9dc14f48815cf9eebc9f42.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
adce1ec161d2536b534fe6c1ce4234815050ea2feb9dc14f48815cf9eebc9f42
-
Size
2.1MB
-
MD5
489854b2db1ba5bda7c929dd810ed4a9
-
SHA1
e3c47bee88154648bff90459f12e8a301386df2b
-
SHA256
adce1ec161d2536b534fe6c1ce4234815050ea2feb9dc14f48815cf9eebc9f42
-
SHA512
92f823213b5c193ce508d93276c872680400c52f04ebc2f60c701216e60cf2a9bb03c561a189fecd7aeba2f183507b59568bec06c3388aaae125063dc67619d8
-
SSDEEP
49152:6zME8KgmwI/NMCeOblTVVA0zTeRtqIXSD4ZSG:GMEVwENMCeOblTVVA+TefqIXSDkSG
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5