General
-
Target
695cc8066e3aee6dfa45eb8aed353e8518feabf47787be25cb3062ef06d38e0cN.exe
-
Size
65KB
-
Sample
241221-1xre7a1nap
-
MD5
8b9cfe609d17ca4508469a09e3a0c2a0
-
SHA1
911fc6ff3a944f7745a1e4aa05cb5f501a85373a
-
SHA256
695cc8066e3aee6dfa45eb8aed353e8518feabf47787be25cb3062ef06d38e0c
-
SHA512
3fbf1283a688e022b2c90a9299e47354bc83776c7606ca6644906ae78ee0bc6fedb389b96f0b15fa6fe8f3480a6d99ecfcdb090a74a9bca444dd305bd4cbac97
-
SSDEEP
1536:fWhKpVZ6B6VFsiMs82Wg7Hr5kIxmsLX7Y0OlO9d/:fWAL5VFsiMs8a7Hr59rcpk99
Static task
static1
Behavioral task
behavioral1
Sample
695cc8066e3aee6dfa45eb8aed353e8518feabf47787be25cb3062ef06d38e0cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
695cc8066e3aee6dfa45eb8aed353e8518feabf47787be25cb3062ef06d38e0cN.exe
-
Size
65KB
-
MD5
8b9cfe609d17ca4508469a09e3a0c2a0
-
SHA1
911fc6ff3a944f7745a1e4aa05cb5f501a85373a
-
SHA256
695cc8066e3aee6dfa45eb8aed353e8518feabf47787be25cb3062ef06d38e0c
-
SHA512
3fbf1283a688e022b2c90a9299e47354bc83776c7606ca6644906ae78ee0bc6fedb389b96f0b15fa6fe8f3480a6d99ecfcdb090a74a9bca444dd305bd4cbac97
-
SSDEEP
1536:fWhKpVZ6B6VFsiMs82Wg7Hr5kIxmsLX7Y0OlO9d/:fWAL5VFsiMs8a7Hr59rcpk99
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5