General
-
Target
0504a0ac58263ef77ee466d7d787d3fe225cbe2f362e29aacefa961b7a431b51.exe
-
Size
65KB
-
Sample
241219-ezl3laxqas
-
MD5
bec6a5b8ea8f723e7797ea14dd52a9e1
-
SHA1
0bf16f03a2579afb32ee74a80ca920127f02c006
-
SHA256
0504a0ac58263ef77ee466d7d787d3fe225cbe2f362e29aacefa961b7a431b51
-
SHA512
7dac5d34de532191b6bf3f0de62ec9270ebf94d327ba49f203ccd4b18e62bad43c57f9befd8c0e1aec4b156496a87f18e25116b4558dde6418d62b750db3262a
-
SSDEEP
1536:gtxU/x4aiGRNEUmB6RfG5GxsB7/caVX9SjBGs1vLT10cUmuO2fG8r:gto4aV/mBi+MGS+S9DxuPmuBG8r
Static task
static1
Behavioral task
behavioral1
Sample
0504a0ac58263ef77ee466d7d787d3fe225cbe2f362e29aacefa961b7a431b51.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0504a0ac58263ef77ee466d7d787d3fe225cbe2f362e29aacefa961b7a431b51.exe
-
Size
65KB
-
MD5
bec6a5b8ea8f723e7797ea14dd52a9e1
-
SHA1
0bf16f03a2579afb32ee74a80ca920127f02c006
-
SHA256
0504a0ac58263ef77ee466d7d787d3fe225cbe2f362e29aacefa961b7a431b51
-
SHA512
7dac5d34de532191b6bf3f0de62ec9270ebf94d327ba49f203ccd4b18e62bad43c57f9befd8c0e1aec4b156496a87f18e25116b4558dde6418d62b750db3262a
-
SSDEEP
1536:gtxU/x4aiGRNEUmB6RfG5GxsB7/caVX9SjBGs1vLT10cUmuO2fG8r:gto4aV/mBi+MGS+S9DxuPmuBG8r
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5