General
-
Target
2ce8407a0d93560ebd8588ea63a07f63092e5234b21d64ab9cf6253a6dd0f9c5.exe
-
Size
97KB
-
Sample
241218-j1p8vssjhm
-
MD5
f3469e80771c316df1ce88cc5060fb6b
-
SHA1
a8be11910a18d36ee1bb84f2fdba561468683f2c
-
SHA256
2ce8407a0d93560ebd8588ea63a07f63092e5234b21d64ab9cf6253a6dd0f9c5
-
SHA512
ee5611d936bb387a86d9282ceb62cb3c1e6b41d1c7b45e1bd6b51f2cb368784c24cb35e26542f52437e2977c0e8559aaafbd94875f0a2e07335db8a6ab48a2e9
-
SSDEEP
1536:GJl7QkTdUjrIAnMWDgQ0a6nqNA1mKDvYjJiOOOv908e4WMbWDl7z1hWLkM8IOuX4:GJl3yjrUWqneAPQjJiuvSPebizJMNgYM
Static task
static1
Behavioral task
behavioral1
Sample
2ce8407a0d93560ebd8588ea63a07f63092e5234b21d64ab9cf6253a6dd0f9c5.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2ce8407a0d93560ebd8588ea63a07f63092e5234b21d64ab9cf6253a6dd0f9c5.exe
-
Size
97KB
-
MD5
f3469e80771c316df1ce88cc5060fb6b
-
SHA1
a8be11910a18d36ee1bb84f2fdba561468683f2c
-
SHA256
2ce8407a0d93560ebd8588ea63a07f63092e5234b21d64ab9cf6253a6dd0f9c5
-
SHA512
ee5611d936bb387a86d9282ceb62cb3c1e6b41d1c7b45e1bd6b51f2cb368784c24cb35e26542f52437e2977c0e8559aaafbd94875f0a2e07335db8a6ab48a2e9
-
SSDEEP
1536:GJl7QkTdUjrIAnMWDgQ0a6nqNA1mKDvYjJiOOOv908e4WMbWDl7z1hWLkM8IOuX4:GJl3yjrUWqneAPQjJiuvSPebizJMNgYM
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5