General
-
Target
e16c8539a3000416d04b0b24a50e4621de899cca49c25ee9f941b9bfae781f49
-
Size
100KB
-
Sample
241221-gmpdasvlfq
-
MD5
f7eb0a88b9ad2156391d8034773482e6
-
SHA1
ad6cb31f1017ff340fbe09e80cd78c879c63aaaf
-
SHA256
e16c8539a3000416d04b0b24a50e4621de899cca49c25ee9f941b9bfae781f49
-
SHA512
c044c655423f5b9c0550d421a3e046a2474f1ca97216c48003364b6df0a9df03e7dc356362eb3e76d6caa50803e6c019da3cdfe79b1fffda8cbad64b9064f3ab
-
SSDEEP
3072:QPCH9q7sZ/H1xegfLpkvY62/EZkt+Zu37ks:QYq7eH1xeukg62/EWJ37p
Static task
static1
Behavioral task
behavioral1
Sample
e16c8539a3000416d04b0b24a50e4621de899cca49c25ee9f941b9bfae781f49.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e16c8539a3000416d04b0b24a50e4621de899cca49c25ee9f941b9bfae781f49
-
Size
100KB
-
MD5
f7eb0a88b9ad2156391d8034773482e6
-
SHA1
ad6cb31f1017ff340fbe09e80cd78c879c63aaaf
-
SHA256
e16c8539a3000416d04b0b24a50e4621de899cca49c25ee9f941b9bfae781f49
-
SHA512
c044c655423f5b9c0550d421a3e046a2474f1ca97216c48003364b6df0a9df03e7dc356362eb3e76d6caa50803e6c019da3cdfe79b1fffda8cbad64b9064f3ab
-
SSDEEP
3072:QPCH9q7sZ/H1xegfLpkvY62/EZkt+Zu37ks:QYq7eH1xeukg62/EWJ37p
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5