General
-
Target
eadf185ea27a0cd417f8dc08b36d862786a9ee78585d5c104bb53e887a87c932.exe
-
Size
97KB
-
Sample
241206-x7sjfstjbv
-
MD5
44b5a2436687fa262cd5860efab7ff9b
-
SHA1
cd6455d1140cab18c738dfa514d49165c705752d
-
SHA256
eadf185ea27a0cd417f8dc08b36d862786a9ee78585d5c104bb53e887a87c932
-
SHA512
e61fe22c169cd831969439181b88398c7117a04809f8bc2e8881b0857909d20843d07545177a14965e3f15691df7c8dd635369a58c98726e45d6c582a721933a
-
SSDEEP
1536:YGPzxQVeGXX4Y4qJAi7wJi85PmmIGki92DdiAvoGpqiDJi5JCv0pyCqzon5L:YyQB1ATPfdmiAgODJ8CMsCqs5L
Static task
static1
Behavioral task
behavioral1
Sample
eadf185ea27a0cd417f8dc08b36d862786a9ee78585d5c104bb53e887a87c932.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
eadf185ea27a0cd417f8dc08b36d862786a9ee78585d5c104bb53e887a87c932.exe
-
Size
97KB
-
MD5
44b5a2436687fa262cd5860efab7ff9b
-
SHA1
cd6455d1140cab18c738dfa514d49165c705752d
-
SHA256
eadf185ea27a0cd417f8dc08b36d862786a9ee78585d5c104bb53e887a87c932
-
SHA512
e61fe22c169cd831969439181b88398c7117a04809f8bc2e8881b0857909d20843d07545177a14965e3f15691df7c8dd635369a58c98726e45d6c582a721933a
-
SSDEEP
1536:YGPzxQVeGXX4Y4qJAi7wJi85PmmIGki92DdiAvoGpqiDJi5JCv0pyCqzon5L:YyQB1ATPfdmiAgODJ8CMsCqs5L
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5