General
-
Target
e895203cb7f6f3ba5d872e10fc1e4fb7f8d3f06dfd6cf4c1c28107696ade3fab
-
Size
1.4MB
-
Sample
241213-h9vz2askgw
-
MD5
7fd06c2e7ac2c724e3aa25b36f975be0
-
SHA1
bf3cc13007fbb5c357f4f9f971d38a8abc2c4742
-
SHA256
e895203cb7f6f3ba5d872e10fc1e4fb7f8d3f06dfd6cf4c1c28107696ade3fab
-
SHA512
623cfe1112e3a59dcb24a5269ac59e20889dff8b861662aff8e45dcdafadc23ef1fd6b8ae7b5f53b489f6e50b949116d2b85a18a1c864a4406021380e58dfdb4
-
SSDEEP
24576:gHjoOV+GZmcA6Kr3XYl2ei9X/DuyBZvKfC9NqbUejLrmr8yaADADJsd:oMO9Gr3Xeidfdsq0b3vmrraADADJK
Static task
static1
Behavioral task
behavioral1
Sample
e895203cb7f6f3ba5d872e10fc1e4fb7f8d3f06dfd6cf4c1c28107696ade3fab.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e895203cb7f6f3ba5d872e10fc1e4fb7f8d3f06dfd6cf4c1c28107696ade3fab
-
Size
1.4MB
-
MD5
7fd06c2e7ac2c724e3aa25b36f975be0
-
SHA1
bf3cc13007fbb5c357f4f9f971d38a8abc2c4742
-
SHA256
e895203cb7f6f3ba5d872e10fc1e4fb7f8d3f06dfd6cf4c1c28107696ade3fab
-
SHA512
623cfe1112e3a59dcb24a5269ac59e20889dff8b861662aff8e45dcdafadc23ef1fd6b8ae7b5f53b489f6e50b949116d2b85a18a1c864a4406021380e58dfdb4
-
SSDEEP
24576:gHjoOV+GZmcA6Kr3XYl2ei9X/DuyBZvKfC9NqbUejLrmr8yaADADJsd:oMO9Gr3Xeidfdsq0b3vmrraADADJK
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5