General
-
Target
96c81b5d4d89769dce3c7affd5ce246b16d8990086b7a0c3e979c806993c8b0b.exe
-
Size
198KB
-
Sample
241222-at951swjcy
-
MD5
c1c3ce2a3a279c936a5ca5a220c95014
-
SHA1
5b07dcaf48c5281e35df355683bc50171ab2d3d0
-
SHA256
96c81b5d4d89769dce3c7affd5ce246b16d8990086b7a0c3e979c806993c8b0b
-
SHA512
3291d93c94b889149c2d0a17c4838161edb54d08028089694c0bfebe71c630f7fac02357d25a41ecdd21efc0af335dba221f375dd2b348ce15dd14f7fb67dd54
-
SSDEEP
3072:YXLVpImRqLOUph/gDk8VUuXuWKZK36K7dQNq/oxnwX5c6LsXS5QRNd6/:MLVpOj4Dk8+cu9Kq65HISoNk
Static task
static1
Behavioral task
behavioral1
Sample
96c81b5d4d89769dce3c7affd5ce246b16d8990086b7a0c3e979c806993c8b0b.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
96c81b5d4d89769dce3c7affd5ce246b16d8990086b7a0c3e979c806993c8b0b.exe
-
Size
198KB
-
MD5
c1c3ce2a3a279c936a5ca5a220c95014
-
SHA1
5b07dcaf48c5281e35df355683bc50171ab2d3d0
-
SHA256
96c81b5d4d89769dce3c7affd5ce246b16d8990086b7a0c3e979c806993c8b0b
-
SHA512
3291d93c94b889149c2d0a17c4838161edb54d08028089694c0bfebe71c630f7fac02357d25a41ecdd21efc0af335dba221f375dd2b348ce15dd14f7fb67dd54
-
SSDEEP
3072:YXLVpImRqLOUph/gDk8VUuXuWKZK36K7dQNq/oxnwX5c6LsXS5QRNd6/:MLVpOj4Dk8+cu9Kq65HISoNk
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5