General
-
Target
9596241e12239eda332b0c56083fb3162b4fa11fbc714cbacf302ef122c40e40
-
Size
81KB
-
Sample
241205-a1wwzavpck
-
MD5
cdf0375a671986bc2b56d6a8d027265d
-
SHA1
44909a45dfeaf080858c49051b63424fa375407d
-
SHA256
9596241e12239eda332b0c56083fb3162b4fa11fbc714cbacf302ef122c40e40
-
SHA512
8e6711f4580bc23deddc87010a9d223729570d07d8d2e5f4ba860b6397020f5bfc16a4b67957602d9a28294b00cb079a97d9b71442d7a2b9d519de7fe0500cb7
-
SSDEEP
1536:Rpj4r406revPqRR+/rZC9Xajg54rlYz7zoTcZ5LIat8Z2KQo:T06rcMR+/Nja4Wz7MIHB8ZVQo
Static task
static1
Behavioral task
behavioral1
Sample
9596241e12239eda332b0c56083fb3162b4fa11fbc714cbacf302ef122c40e40.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
9596241e12239eda332b0c56083fb3162b4fa11fbc714cbacf302ef122c40e40
-
Size
81KB
-
MD5
cdf0375a671986bc2b56d6a8d027265d
-
SHA1
44909a45dfeaf080858c49051b63424fa375407d
-
SHA256
9596241e12239eda332b0c56083fb3162b4fa11fbc714cbacf302ef122c40e40
-
SHA512
8e6711f4580bc23deddc87010a9d223729570d07d8d2e5f4ba860b6397020f5bfc16a4b67957602d9a28294b00cb079a97d9b71442d7a2b9d519de7fe0500cb7
-
SSDEEP
1536:Rpj4r406revPqRR+/rZC9Xajg54rlYz7zoTcZ5LIat8Z2KQo:T06rcMR+/Nja4Wz7MIHB8ZVQo
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5