General
-
Target
236eebd55ebce7dc0391ed4cf77a87d78704223ec64bb42e32c86533fd07a0eaN.exe
-
Size
97KB
-
Sample
241207-fm872axlc1
-
MD5
1c8106a75fbef0ab904bf9ad94207440
-
SHA1
62ebb9ee507db59fa9c86fbbc89586d5cfecba27
-
SHA256
236eebd55ebce7dc0391ed4cf77a87d78704223ec64bb42e32c86533fd07a0ea
-
SHA512
a2a0ea9553ec81911449d39813f0987d74a0a054a19712a1ac29be326a3ff37033e96a944ef9bc0d08749adec093bacceec1b6667ec107ec1ab159620418ede7
-
SSDEEP
1536:u/A616Z+0bJMsPBVTs/bfKolMp8bWbCpbY9mVV9kYrBiLXeRzcG:CR14+2JMSQbio6KbWbB9y9k8BiMzc
Static task
static1
Behavioral task
behavioral1
Sample
236eebd55ebce7dc0391ed4cf77a87d78704223ec64bb42e32c86533fd07a0eaN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
236eebd55ebce7dc0391ed4cf77a87d78704223ec64bb42e32c86533fd07a0eaN.exe
-
Size
97KB
-
MD5
1c8106a75fbef0ab904bf9ad94207440
-
SHA1
62ebb9ee507db59fa9c86fbbc89586d5cfecba27
-
SHA256
236eebd55ebce7dc0391ed4cf77a87d78704223ec64bb42e32c86533fd07a0ea
-
SHA512
a2a0ea9553ec81911449d39813f0987d74a0a054a19712a1ac29be326a3ff37033e96a944ef9bc0d08749adec093bacceec1b6667ec107ec1ab159620418ede7
-
SSDEEP
1536:u/A616Z+0bJMsPBVTs/bfKolMp8bWbCpbY9mVV9kYrBiLXeRzcG:CR14+2JMSQbio6KbWbB9y9k8BiMzc
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5