General
-
Target
bbd7e401cb0f1f6bae33de59db34d14f653ccda213f312ecbc764b7992fb22bdN.exe
-
Size
1.0MB
-
Sample
241216-gn38vaymcr
-
MD5
268c923c5424a4699ffcd4c701a08f40
-
SHA1
54fe1d873dee21c55c5388d82d1533f077666c19
-
SHA256
bbd7e401cb0f1f6bae33de59db34d14f653ccda213f312ecbc764b7992fb22bd
-
SHA512
1c921b14caf864cd08110470301c6871a1584df1a985b51423ba99d980f860ac4a8af8613730e6705c7023b5839f46c92ed0746b97d94138775c5f31089e077f
-
SSDEEP
12288:WnPF6Swv8ZePLVUVTFYA7+RoFiNC/8WeZJt5kLeCvieb6MsQcnvzrNpluzp/jtQ:Vfv8ZEV27+RZC/CZJtEOBv3luzp/C
Static task
static1
Behavioral task
behavioral1
Sample
bbd7e401cb0f1f6bae33de59db34d14f653ccda213f312ecbc764b7992fb22bdN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bbd7e401cb0f1f6bae33de59db34d14f653ccda213f312ecbc764b7992fb22bdN.exe
-
Size
1.0MB
-
MD5
268c923c5424a4699ffcd4c701a08f40
-
SHA1
54fe1d873dee21c55c5388d82d1533f077666c19
-
SHA256
bbd7e401cb0f1f6bae33de59db34d14f653ccda213f312ecbc764b7992fb22bd
-
SHA512
1c921b14caf864cd08110470301c6871a1584df1a985b51423ba99d980f860ac4a8af8613730e6705c7023b5839f46c92ed0746b97d94138775c5f31089e077f
-
SSDEEP
12288:WnPF6Swv8ZePLVUVTFYA7+RoFiNC/8WeZJt5kLeCvieb6MsQcnvzrNpluzp/jtQ:Vfv8ZEV27+RZC/CZJtEOBv3luzp/C
-
Modifies firewall policy service
-
Sality family
-
Drops file in Drivers directory
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5