General
-
Target
91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89
-
Size
2.6MB
-
Sample
241206-xzfjxssney
-
MD5
a72f8d0b9fa89df6926798790b19fd91
-
SHA1
e68c3a5274eee1437860c40dce37b1d267d8c311
-
SHA256
91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89
-
SHA512
27421c12d4bbfdb65df9fc0ef90e7a7725e251e283216a2a8c0bd9c78e4fe9bb87874b67104289fae6bac4a35ca1bf6ac83614e36b391458736261991480270b
-
SSDEEP
49152:RqeN9mJIwe9X/E4dIzSY3G//Iisfy5lKXgGgMTr6A:II9CIwe9XMcIz72/Qisf6llMTrj
Static task
static1
Behavioral task
behavioral1
Sample
91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89
-
Size
2.6MB
-
MD5
a72f8d0b9fa89df6926798790b19fd91
-
SHA1
e68c3a5274eee1437860c40dce37b1d267d8c311
-
SHA256
91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89
-
SHA512
27421c12d4bbfdb65df9fc0ef90e7a7725e251e283216a2a8c0bd9c78e4fe9bb87874b67104289fae6bac4a35ca1bf6ac83614e36b391458736261991480270b
-
SSDEEP
49152:RqeN9mJIwe9X/E4dIzSY3G//Iisfy5lKXgGgMTr6A:II9CIwe9XMcIz72/Qisf6llMTrj
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5