General
-
Target
5df47b757c60b0d4ebf35238023bf6c7da85c69eccc76e69ab76750991212f40
-
Size
152KB
-
Sample
241207-szyy2s1pfl
-
MD5
601c42e3bdcc65999fc3e7af50117a72
-
SHA1
c0ccb5322609b3a486c3f14a1af556a4cdc0f1bf
-
SHA256
5df47b757c60b0d4ebf35238023bf6c7da85c69eccc76e69ab76750991212f40
-
SHA512
833bc3cfbf2f7f18b88f1c32b35a4fb5741e39269196710bc11bd91948f6ce34f577a88be4026973f39d5194ba157d791757f0cf73092d1109c105dd9e9e707c
-
SSDEEP
3072:q2YyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMx:f8nXH+lN9hHwaqEnq0I6YaM7
Static task
static1
Behavioral task
behavioral1
Sample
5df47b757c60b0d4ebf35238023bf6c7da85c69eccc76e69ab76750991212f40.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5df47b757c60b0d4ebf35238023bf6c7da85c69eccc76e69ab76750991212f40
-
Size
152KB
-
MD5
601c42e3bdcc65999fc3e7af50117a72
-
SHA1
c0ccb5322609b3a486c3f14a1af556a4cdc0f1bf
-
SHA256
5df47b757c60b0d4ebf35238023bf6c7da85c69eccc76e69ab76750991212f40
-
SHA512
833bc3cfbf2f7f18b88f1c32b35a4fb5741e39269196710bc11bd91948f6ce34f577a88be4026973f39d5194ba157d791757f0cf73092d1109c105dd9e9e707c
-
SSDEEP
3072:q2YyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMx:f8nXH+lN9hHwaqEnq0I6YaM7
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5