General
-
Target
5ca219a35cf5f236f6b93a06526ee6573ddc4e5f059c00803dc1c9e100625d98N.exe
-
Size
1.0MB
-
Sample
241216-nc6yxsyqfk
-
MD5
2fd8830a7f50f96506e04dec1beafb40
-
SHA1
5956ad63d0db3fa67501e39877ade72f8acab733
-
SHA256
5ca219a35cf5f236f6b93a06526ee6573ddc4e5f059c00803dc1c9e100625d98
-
SHA512
e0e2c883fde2e618820eaafa1cdc90ac8afe98ea024e32fa7bc854e60146ef3f91396b9f8032379fede31f0a0c571ca6274e13af27729cf51b15bf910cb0d191
-
SSDEEP
12288:dNEBJ17ib5lM4lkL1p5e6lsVbhdTml9ckZzlpAWZPiQwWLwPZMZT8KFYoq9:dNM745ldl81H5lybrQWWZaQVLwBOPa
Static task
static1
Behavioral task
behavioral1
Sample
5ca219a35cf5f236f6b93a06526ee6573ddc4e5f059c00803dc1c9e100625d98N.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5ca219a35cf5f236f6b93a06526ee6573ddc4e5f059c00803dc1c9e100625d98N.exe
-
Size
1.0MB
-
MD5
2fd8830a7f50f96506e04dec1beafb40
-
SHA1
5956ad63d0db3fa67501e39877ade72f8acab733
-
SHA256
5ca219a35cf5f236f6b93a06526ee6573ddc4e5f059c00803dc1c9e100625d98
-
SHA512
e0e2c883fde2e618820eaafa1cdc90ac8afe98ea024e32fa7bc854e60146ef3f91396b9f8032379fede31f0a0c571ca6274e13af27729cf51b15bf910cb0d191
-
SSDEEP
12288:dNEBJ17ib5lM4lkL1p5e6lsVbhdTml9ckZzlpAWZPiQwWLwPZMZT8KFYoq9:dNM745ldl81H5lybrQWWZaQVLwBOPa
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5