General
-
Target
adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95cN.exe
-
Size
65KB
-
Sample
241204-1aeswaskdv
-
MD5
58e88fba39accc5c19cdbbbbd30000a0
-
SHA1
295d7866efc37c819db9e500a79b885291168609
-
SHA256
adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95c
-
SHA512
9843b795dc04bb1b8dab03ab94c65b9c6db16b77697a3d5d9513b1dbdd075c9afa9f289ad8c1d355ec4093c26d169572eb33b77a346361f4c165d22b8aad9051
-
SSDEEP
1536:HI5JXboI22PUL17ptqVLUnonxZ3XUIuNvkCQv:HwXbB22PWNtqRXnLHUHo
Static task
static1
Behavioral task
behavioral1
Sample
adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95cN.exe
-
Size
65KB
-
MD5
58e88fba39accc5c19cdbbbbd30000a0
-
SHA1
295d7866efc37c819db9e500a79b885291168609
-
SHA256
adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95c
-
SHA512
9843b795dc04bb1b8dab03ab94c65b9c6db16b77697a3d5d9513b1dbdd075c9afa9f289ad8c1d355ec4093c26d169572eb33b77a346361f4c165d22b8aad9051
-
SSDEEP
1536:HI5JXboI22PUL17ptqVLUnonxZ3XUIuNvkCQv:HwXbB22PWNtqRXnLHUHo
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5