General
-
Target
adc361f6cae699cd1f0cc1e180d003df6a919b31b1f7871f8b8cfaf0f416da6a
-
Size
344KB
-
Sample
241212-b3qy6swkdz
-
MD5
6e390bff1e8f879ae59f3e03257934c6
-
SHA1
32a082ecdbca217d3f01f6bf699efd56d49c61b5
-
SHA256
adc361f6cae699cd1f0cc1e180d003df6a919b31b1f7871f8b8cfaf0f416da6a
-
SHA512
9911a80007071382bd7b6e21888882c49f138fb9c91d7137404ddf6a7ec760ad1ebb828c085e58e871efd66403a922623ea1d9514ee6cb1ddadf08cd87a090d8
-
SSDEEP
6144:vrmYAzdIDahxgRxUfeTTc2//03apNdPTfy4YHCW0KGxVOki:zmYAzAsW03ap/PTDYiW07yh
Static task
static1
Behavioral task
behavioral1
Sample
adc361f6cae699cd1f0cc1e180d003df6a919b31b1f7871f8b8cfaf0f416da6a.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
adc361f6cae699cd1f0cc1e180d003df6a919b31b1f7871f8b8cfaf0f416da6a
-
Size
344KB
-
MD5
6e390bff1e8f879ae59f3e03257934c6
-
SHA1
32a082ecdbca217d3f01f6bf699efd56d49c61b5
-
SHA256
adc361f6cae699cd1f0cc1e180d003df6a919b31b1f7871f8b8cfaf0f416da6a
-
SHA512
9911a80007071382bd7b6e21888882c49f138fb9c91d7137404ddf6a7ec760ad1ebb828c085e58e871efd66403a922623ea1d9514ee6cb1ddadf08cd87a090d8
-
SSDEEP
6144:vrmYAzdIDahxgRxUfeTTc2//03apNdPTfy4YHCW0KGxVOki:zmYAzAsW03ap/PTDYiW07yh
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5