General
-
Target
5620a4ae5f4865626378ba3f1d84c4a673c5e040841bbdb25eb3431bcd71e40f
-
Size
264KB
-
Sample
241203-yzmtnssjey
-
MD5
389c846427565719808843abbc8d1393
-
SHA1
8c040d4ac36097a2b3cc9486ea608c02bcd0be5b
-
SHA256
5620a4ae5f4865626378ba3f1d84c4a673c5e040841bbdb25eb3431bcd71e40f
-
SHA512
18b8ebc6ed0d3f93fcb9940fe266767f3f8a13ce5a696b7d02e13c08e84a6e0de5072c02bc61dd0e0345520564d87c40913cb41e5679257a91f3aa161572e335
-
SSDEEP
1536:Yz9Q8v4jAh4OEUSQ05ffffffffffffff9fffffffffffffftSp2K4bPCLdEEsYr/:YBQ8vyOEu0O+YUseTMrVWbAOTFyM0t1
Static task
static1
Behavioral task
behavioral1
Sample
5620a4ae5f4865626378ba3f1d84c4a673c5e040841bbdb25eb3431bcd71e40f.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5620a4ae5f4865626378ba3f1d84c4a673c5e040841bbdb25eb3431bcd71e40f
-
Size
264KB
-
MD5
389c846427565719808843abbc8d1393
-
SHA1
8c040d4ac36097a2b3cc9486ea608c02bcd0be5b
-
SHA256
5620a4ae5f4865626378ba3f1d84c4a673c5e040841bbdb25eb3431bcd71e40f
-
SHA512
18b8ebc6ed0d3f93fcb9940fe266767f3f8a13ce5a696b7d02e13c08e84a6e0de5072c02bc61dd0e0345520564d87c40913cb41e5679257a91f3aa161572e335
-
SSDEEP
1536:Yz9Q8v4jAh4OEUSQ05ffffffffffffff9fffffffffffffftSp2K4bPCLdEEsYr/:YBQ8vyOEu0O+YUseTMrVWbAOTFyM0t1
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5