General
-
Target
c365ea7f98ac7786cbaeb3e3ad8668ad70554d75adca5fc8ba322e177c41ea7cN.exe
-
Size
97KB
-
Sample
241216-pecnjaznct
-
MD5
d65186e8bc9f2646a74debf5bfa09450
-
SHA1
3d8593673d944df51a61f1a42e7f6767586053d6
-
SHA256
c365ea7f98ac7786cbaeb3e3ad8668ad70554d75adca5fc8ba322e177c41ea7c
-
SHA512
8fa516dc6cfe0c1bd3076d51e69364a2c7c8ec445b3d94cc533a2e4bb1c0fffd2d7e87aea050bb35a0a5a1627d4c631c32d5755c1d5055c7b5003967bc852b9b
-
SSDEEP
3072:ylTFPdnBPcyVFAyf8mcNi650nmRyqc504:m5VnC8umhk54LX
Static task
static1
Behavioral task
behavioral1
Sample
c365ea7f98ac7786cbaeb3e3ad8668ad70554d75adca5fc8ba322e177c41ea7cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c365ea7f98ac7786cbaeb3e3ad8668ad70554d75adca5fc8ba322e177c41ea7cN.exe
-
Size
97KB
-
MD5
d65186e8bc9f2646a74debf5bfa09450
-
SHA1
3d8593673d944df51a61f1a42e7f6767586053d6
-
SHA256
c365ea7f98ac7786cbaeb3e3ad8668ad70554d75adca5fc8ba322e177c41ea7c
-
SHA512
8fa516dc6cfe0c1bd3076d51e69364a2c7c8ec445b3d94cc533a2e4bb1c0fffd2d7e87aea050bb35a0a5a1627d4c631c32d5755c1d5055c7b5003967bc852b9b
-
SSDEEP
3072:ylTFPdnBPcyVFAyf8mcNi650nmRyqc504:m5VnC8umhk54LX
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5