General
-
Target
e696b6cb6f7d30a36498f3fd2998646435da59d8fbb674212af91de5fba82d81N.exe
-
Size
102KB
-
Sample
241207-j79wvatph1
-
MD5
c35456e1afc9a943cd198716c0d0e170
-
SHA1
1696d77685d4864e563c507ae27769e497a84c14
-
SHA256
e696b6cb6f7d30a36498f3fd2998646435da59d8fbb674212af91de5fba82d81
-
SHA512
22165229d218d83d9dd45203374eee3d6a1608b633ccef6a9d25ef5d49eb5458d245ff326f8c2eaead6657140709c8abf1c89c3f8b6ac3d457f19185626c473f
-
SSDEEP
3072:N9aOTEMXDxO3mJV05tupkYzC8Lkh7duLIgL2rD4nzU:N9aCvDxO3m72kprCAquLTy4nzU
Static task
static1
Behavioral task
behavioral1
Sample
e696b6cb6f7d30a36498f3fd2998646435da59d8fbb674212af91de5fba82d81N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e696b6cb6f7d30a36498f3fd2998646435da59d8fbb674212af91de5fba82d81N.exe
-
Size
102KB
-
MD5
c35456e1afc9a943cd198716c0d0e170
-
SHA1
1696d77685d4864e563c507ae27769e497a84c14
-
SHA256
e696b6cb6f7d30a36498f3fd2998646435da59d8fbb674212af91de5fba82d81
-
SHA512
22165229d218d83d9dd45203374eee3d6a1608b633ccef6a9d25ef5d49eb5458d245ff326f8c2eaead6657140709c8abf1c89c3f8b6ac3d457f19185626c473f
-
SSDEEP
3072:N9aOTEMXDxO3mJV05tupkYzC8Lkh7duLIgL2rD4nzU:N9aCvDxO3m72kprCAquLTy4nzU
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5