General
-
Target
613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3.exe
-
Size
65KB
-
Sample
241217-z6vzaszjbn
-
MD5
0636e3027bfa59dae1ef95a4e6f191d1
-
SHA1
64eab731d84ff175fce5123523d14b59cd443077
-
SHA256
613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3
-
SHA512
8ea30fa859c6c2a455d93c07888c27570e7ed1865db1ef963bc37e3919806228e0bda36fc613039107d65a9e23dba0fd1eae6092462caa07d0ef2109496fec2c
-
SSDEEP
1536:WTlEXdxhp9z5+BvOlTSeQXYwRqu0a72qi2A20C0vCJsgB1o8jqu:Wuxhp9z5HSlIqq02qig7mCJsgB1HWu
Static task
static1
Behavioral task
behavioral1
Sample
613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3.exe
-
Size
65KB
-
MD5
0636e3027bfa59dae1ef95a4e6f191d1
-
SHA1
64eab731d84ff175fce5123523d14b59cd443077
-
SHA256
613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3
-
SHA512
8ea30fa859c6c2a455d93c07888c27570e7ed1865db1ef963bc37e3919806228e0bda36fc613039107d65a9e23dba0fd1eae6092462caa07d0ef2109496fec2c
-
SSDEEP
1536:WTlEXdxhp9z5+BvOlTSeQXYwRqu0a72qi2A20C0vCJsgB1o8jqu:Wuxhp9z5HSlIqq02qig7mCJsgB1HWu
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5