General
-
Target
2932456d3781925b0bf7482bb2044b214990f6f1bc921e979c0be7d202756959.exe
-
Size
184KB
-
Sample
241203-zdtwjasqhs
-
MD5
0b0019c93bfba0e9bf9e8842006528c5
-
SHA1
f167fa2da471ee8a37b55c7477e308d64ec3397a
-
SHA256
2932456d3781925b0bf7482bb2044b214990f6f1bc921e979c0be7d202756959
-
SHA512
10716528e174653c81ce445900eaf8f12b57cdb63c5782e377d3fff090f0055c92ddc565534632206cc5375ab689c32c677b8190d4d6425b25d3c7d6998b3a95
-
SSDEEP
3072:B2WVxGGIh4UFnlUIGOlhIQZS/b2si/cUeNXfx2JWGWpY:DBvUFnuNOlOJAklXfx2JWa
Static task
static1
Behavioral task
behavioral1
Sample
2932456d3781925b0bf7482bb2044b214990f6f1bc921e979c0be7d202756959.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2932456d3781925b0bf7482bb2044b214990f6f1bc921e979c0be7d202756959.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2932456d3781925b0bf7482bb2044b214990f6f1bc921e979c0be7d202756959.exe
-
Size
184KB
-
MD5
0b0019c93bfba0e9bf9e8842006528c5
-
SHA1
f167fa2da471ee8a37b55c7477e308d64ec3397a
-
SHA256
2932456d3781925b0bf7482bb2044b214990f6f1bc921e979c0be7d202756959
-
SHA512
10716528e174653c81ce445900eaf8f12b57cdb63c5782e377d3fff090f0055c92ddc565534632206cc5375ab689c32c677b8190d4d6425b25d3c7d6998b3a95
-
SSDEEP
3072:B2WVxGGIh4UFnlUIGOlhIQZS/b2si/cUeNXfx2JWGWpY:DBvUFnuNOlOJAklXfx2JWa
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5