General
-
Target
31d8bb99f31741e0d706c7171348a68da6d5fd8f5f4dcd007d1d3329a107d895
-
Size
2.6MB
-
Sample
241206-z4rtvsxqdx
-
MD5
9f8ef9f26806547501d40079488877d4
-
SHA1
d75542433696c544a2266c5dc17a937baf5d468c
-
SHA256
31d8bb99f31741e0d706c7171348a68da6d5fd8f5f4dcd007d1d3329a107d895
-
SHA512
079b3c1c7984ac40f0e1116a19f1a719459d28779d2464f1aa450dfe6e35fc2745a5f28a6ba3cd91eb5394d2624f6d41e1301d1177032d21bead16c0a75189a7
-
SSDEEP
49152:4qeN9mJIwe9X/E4dIzSY3G//Iisfy5lKXpGgMTr1:lI9CIwe9XMcIz72/Qisf6lYMTr1
Static task
static1
Behavioral task
behavioral1
Sample
31d8bb99f31741e0d706c7171348a68da6d5fd8f5f4dcd007d1d3329a107d895.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
31d8bb99f31741e0d706c7171348a68da6d5fd8f5f4dcd007d1d3329a107d895
-
Size
2.6MB
-
MD5
9f8ef9f26806547501d40079488877d4
-
SHA1
d75542433696c544a2266c5dc17a937baf5d468c
-
SHA256
31d8bb99f31741e0d706c7171348a68da6d5fd8f5f4dcd007d1d3329a107d895
-
SHA512
079b3c1c7984ac40f0e1116a19f1a719459d28779d2464f1aa450dfe6e35fc2745a5f28a6ba3cd91eb5394d2624f6d41e1301d1177032d21bead16c0a75189a7
-
SSDEEP
49152:4qeN9mJIwe9X/E4dIzSY3G//Iisfy5lKXpGgMTr1:lI9CIwe9XMcIz72/Qisf6lYMTr1
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5