General
-
Target
7c18cdf7dd9abd10a5e97dac7fbadca736924f081cc79d373cee8fb8a75a331e
-
Size
160KB
-
Sample
241207-s1cgfa1pgn
-
MD5
864fc548f95ca0c387655f50ea035194
-
SHA1
ea554f2a4f190f4f476dd12ac2fc506e3d35d15a
-
SHA256
7c18cdf7dd9abd10a5e97dac7fbadca736924f081cc79d373cee8fb8a75a331e
-
SHA512
450d78f7ac471a6ac2557c4340b56644afd9ada73082452c28590d2182143c9fc81fd86fcd3d70afc34de599f0afbcc57e4133158269de6ac8c5bb2b5aa24dd3
-
SSDEEP
3072:I0YyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMm:r8nXH+iaJKiQqaJ0SAN8u
Static task
static1
Behavioral task
behavioral1
Sample
7c18cdf7dd9abd10a5e97dac7fbadca736924f081cc79d373cee8fb8a75a331e.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
7c18cdf7dd9abd10a5e97dac7fbadca736924f081cc79d373cee8fb8a75a331e
-
Size
160KB
-
MD5
864fc548f95ca0c387655f50ea035194
-
SHA1
ea554f2a4f190f4f476dd12ac2fc506e3d35d15a
-
SHA256
7c18cdf7dd9abd10a5e97dac7fbadca736924f081cc79d373cee8fb8a75a331e
-
SHA512
450d78f7ac471a6ac2557c4340b56644afd9ada73082452c28590d2182143c9fc81fd86fcd3d70afc34de599f0afbcc57e4133158269de6ac8c5bb2b5aa24dd3
-
SSDEEP
3072:I0YyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMm:r8nXH+iaJKiQqaJ0SAN8u
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5