General
-
Target
8f8fcaae4da8a37b6e5135d64091d509342bdda35ac5efb6a481d0e6df36c144
-
Size
194KB
-
Sample
241216-a7wvjsvqet
-
MD5
f8de4c4c3f5df73a4b54b6728a6c8b6e
-
SHA1
506a46f75ded3bf11aa4886417848b2a74c71956
-
SHA256
8f8fcaae4da8a37b6e5135d64091d509342bdda35ac5efb6a481d0e6df36c144
-
SHA512
ce4405058246b57964ba7cfff538eaebea7f1cebaebf9701fb846945c58607e55513b749994c0f146de3bc79767d6b80909792611eb13b6143a78d553128d544
-
SSDEEP
3072:nZLVpImRqLOUph/5ULSAMcvMy2yIFAFCCWy9nwX5c6LsXS5QRNd6:ZLVpOjhULZvxIuXH65HISoN
Static task
static1
Behavioral task
behavioral1
Sample
8f8fcaae4da8a37b6e5135d64091d509342bdda35ac5efb6a481d0e6df36c144.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8f8fcaae4da8a37b6e5135d64091d509342bdda35ac5efb6a481d0e6df36c144
-
Size
194KB
-
MD5
f8de4c4c3f5df73a4b54b6728a6c8b6e
-
SHA1
506a46f75ded3bf11aa4886417848b2a74c71956
-
SHA256
8f8fcaae4da8a37b6e5135d64091d509342bdda35ac5efb6a481d0e6df36c144
-
SHA512
ce4405058246b57964ba7cfff538eaebea7f1cebaebf9701fb846945c58607e55513b749994c0f146de3bc79767d6b80909792611eb13b6143a78d553128d544
-
SSDEEP
3072:nZLVpImRqLOUph/5ULSAMcvMy2yIFAFCCWy9nwX5c6LsXS5QRNd6:ZLVpOjhULZvxIuXH65HISoN
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5