General
-
Target
31fa522ba3d9ad43bbabd32df9adec82c5883424e25d650830e7d8aa735fb177.exe
-
Size
619KB
-
Sample
241221-1w6hqa1kex
-
MD5
2ff996e1f42ae001e1d5df40b76356b8
-
SHA1
53a777bb14f5c116181396864aa22c8f39574466
-
SHA256
31fa522ba3d9ad43bbabd32df9adec82c5883424e25d650830e7d8aa735fb177
-
SHA512
57353774b83d5daf7474eaee428aa8efc706ba0fed071bc595315a075ed96f004ed95defb65abbb94b7f1fedf39b7d87589e766ff56496208993e0ab35db36cf
-
SSDEEP
12288:ENR/3fG88888888S88888888888888888888888888888888888888888888888T:c3fG88888888S888888888888888888s
Static task
static1
Behavioral task
behavioral1
Sample
31fa522ba3d9ad43bbabd32df9adec82c5883424e25d650830e7d8aa735fb177.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
31fa522ba3d9ad43bbabd32df9adec82c5883424e25d650830e7d8aa735fb177.exe
-
Size
619KB
-
MD5
2ff996e1f42ae001e1d5df40b76356b8
-
SHA1
53a777bb14f5c116181396864aa22c8f39574466
-
SHA256
31fa522ba3d9ad43bbabd32df9adec82c5883424e25d650830e7d8aa735fb177
-
SHA512
57353774b83d5daf7474eaee428aa8efc706ba0fed071bc595315a075ed96f004ed95defb65abbb94b7f1fedf39b7d87589e766ff56496208993e0ab35db36cf
-
SSDEEP
12288:ENR/3fG88888888S88888888888888888888888888888888888888888888888T:c3fG88888888S888888888888888888s
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5