General
-
Target
b45e39db3ccd38fc1bcee7b9fa06f7f56d8d74c56178da90f54daa29e397c0e6N.exe
-
Size
97KB
-
Sample
241220-hca9cssrbm
-
MD5
c27eba94fa04c060259705ff7ee499f0
-
SHA1
3dc4c39868a4bf94c550f246aefee2ab61b18edc
-
SHA256
b45e39db3ccd38fc1bcee7b9fa06f7f56d8d74c56178da90f54daa29e397c0e6
-
SHA512
f0a7d11be508e1a17b17bd98dfce21b435fc9e98c75c7bebd4d78e74b7b8aa073410062e1a1d00815746a4ac892c91d0f8dbd0d868db402e6dac7e95f7a6225a
-
SSDEEP
1536:7Ortuh286dgK41OGXszSjcbIH84vz217U2rgDTx9DBOovPGfyezAjJnm3m:6rtugPgDQ3auc84vuUVko3GZzAw3
Static task
static1
Behavioral task
behavioral1
Sample
b45e39db3ccd38fc1bcee7b9fa06f7f56d8d74c56178da90f54daa29e397c0e6N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b45e39db3ccd38fc1bcee7b9fa06f7f56d8d74c56178da90f54daa29e397c0e6N.exe
-
Size
97KB
-
MD5
c27eba94fa04c060259705ff7ee499f0
-
SHA1
3dc4c39868a4bf94c550f246aefee2ab61b18edc
-
SHA256
b45e39db3ccd38fc1bcee7b9fa06f7f56d8d74c56178da90f54daa29e397c0e6
-
SHA512
f0a7d11be508e1a17b17bd98dfce21b435fc9e98c75c7bebd4d78e74b7b8aa073410062e1a1d00815746a4ac892c91d0f8dbd0d868db402e6dac7e95f7a6225a
-
SSDEEP
1536:7Ortuh286dgK41OGXszSjcbIH84vz217U2rgDTx9DBOovPGfyezAjJnm3m:6rtugPgDQ3auc84vuUVko3GZzAw3
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5