General
-
Target
d48cdc18dc75c7fc71cf18922e533f1fade5461ad47dfc1bc363773c57801ba8.exe
-
Size
1.8MB
-
Sample
241206-n64ewsslam
-
MD5
486bc8ac1da06be52d39da2e756ec26e
-
SHA1
e76ffd8d667d8ca10e3dd3c18d50b875337fff80
-
SHA256
d48cdc18dc75c7fc71cf18922e533f1fade5461ad47dfc1bc363773c57801ba8
-
SHA512
07fd28678b845ef808b09f4ab6273f08d63482d9c502a7cd14fc858df37ec48bf7a940e33c2015befafcd626b228ecb7c537b88dd79618414c046979ea8cd6e4
-
SSDEEP
49152:dwnrrLHonFxTCYIj+1ZeuH0yGdak2Yht0FGfC/YiqK9aINDPIZ3:dw3LHonFxTzIKZefyGdak2Yht0FGJK9e
Static task
static1
Behavioral task
behavioral1
Sample
d48cdc18dc75c7fc71cf18922e533f1fade5461ad47dfc1bc363773c57801ba8.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d48cdc18dc75c7fc71cf18922e533f1fade5461ad47dfc1bc363773c57801ba8.exe
-
Size
1.8MB
-
MD5
486bc8ac1da06be52d39da2e756ec26e
-
SHA1
e76ffd8d667d8ca10e3dd3c18d50b875337fff80
-
SHA256
d48cdc18dc75c7fc71cf18922e533f1fade5461ad47dfc1bc363773c57801ba8
-
SHA512
07fd28678b845ef808b09f4ab6273f08d63482d9c502a7cd14fc858df37ec48bf7a940e33c2015befafcd626b228ecb7c537b88dd79618414c046979ea8cd6e4
-
SSDEEP
49152:dwnrrLHonFxTCYIj+1ZeuH0yGdak2Yht0FGfC/YiqK9aINDPIZ3:dw3LHonFxTzIKZefyGdak2Yht0FGJK9e
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5