General
-
Target
f2beca83189cc4ea0968c0849ba6f1630918f174050032825a256f9199bb29d4N.exe
-
Size
65KB
-
Sample
241204-gjfxrazmep
-
MD5
5d924b24ed00698b297a71870c0ae440
-
SHA1
3b138b55290cd41d075c6f335ea8fa7ba1a28f8b
-
SHA256
f2beca83189cc4ea0968c0849ba6f1630918f174050032825a256f9199bb29d4
-
SHA512
edc78aaa398e9c8f8949de1814124549f668ef31588de4686199de490743e02da4c99169c306366e6cef7cd582c797810995f9376819d9718e488ba31adfddab
-
SSDEEP
768:vNOQ0ynrY7wrO3qzJCtsnEEOOf7sUeSP67Jdj7vOv/84Y9951a7g5s3YeKRJPHti:tVn8CddCEOOf7sFqv04YH5a5KRJ5y
Static task
static1
Behavioral task
behavioral1
Sample
f2beca83189cc4ea0968c0849ba6f1630918f174050032825a256f9199bb29d4N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f2beca83189cc4ea0968c0849ba6f1630918f174050032825a256f9199bb29d4N.exe
-
Size
65KB
-
MD5
5d924b24ed00698b297a71870c0ae440
-
SHA1
3b138b55290cd41d075c6f335ea8fa7ba1a28f8b
-
SHA256
f2beca83189cc4ea0968c0849ba6f1630918f174050032825a256f9199bb29d4
-
SHA512
edc78aaa398e9c8f8949de1814124549f668ef31588de4686199de490743e02da4c99169c306366e6cef7cd582c797810995f9376819d9718e488ba31adfddab
-
SSDEEP
768:vNOQ0ynrY7wrO3qzJCtsnEEOOf7sUeSP67Jdj7vOv/84Y9951a7g5s3YeKRJPHti:tVn8CddCEOOf7sFqv04YH5a5KRJ5y
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5