General
-
Target
8a7acbd5aad73072cc51ebd58b6cd05b902d6135a7df5284ff44aa857d03f025.exe
-
Size
100KB
-
Sample
241204-dhd5zstnhl
-
MD5
2a3a830608403946e1407357d44310b2
-
SHA1
b1ce0ccb0dd3e1891c54df7920c4c90b69a11f15
-
SHA256
8a7acbd5aad73072cc51ebd58b6cd05b902d6135a7df5284ff44aa857d03f025
-
SHA512
cb785cb7b6f8490c79a2f19d7c991f5708f8e2afb5b9584f8929e51293586788513de8f8dc77ef71f0bd1b415db3ce44a64d35c5eef9cdc2fe57d6d66fa4c59c
-
SSDEEP
3072:qEYsIemHyYh/EOQkQqoXZMSwo06YIyBMVFwfrPvSR:qHTHXqPDVwX6YfBUmPo
Static task
static1
Behavioral task
behavioral1
Sample
8a7acbd5aad73072cc51ebd58b6cd05b902d6135a7df5284ff44aa857d03f025.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
8a7acbd5aad73072cc51ebd58b6cd05b902d6135a7df5284ff44aa857d03f025.exe
-
Size
100KB
-
MD5
2a3a830608403946e1407357d44310b2
-
SHA1
b1ce0ccb0dd3e1891c54df7920c4c90b69a11f15
-
SHA256
8a7acbd5aad73072cc51ebd58b6cd05b902d6135a7df5284ff44aa857d03f025
-
SHA512
cb785cb7b6f8490c79a2f19d7c991f5708f8e2afb5b9584f8929e51293586788513de8f8dc77ef71f0bd1b415db3ce44a64d35c5eef9cdc2fe57d6d66fa4c59c
-
SSDEEP
3072:qEYsIemHyYh/EOQkQqoXZMSwo06YIyBMVFwfrPvSR:qHTHXqPDVwX6YfBUmPo
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5