General
-
Target
9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd
-
Size
65KB
-
Sample
241225-bcp9yssndy
-
MD5
28e166ea1a60fd07f270a3d4487c70a5
-
SHA1
c9df59b84e6983c25ba362dd321e93feacc0c7db
-
SHA256
9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd
-
SHA512
1f77a0ae973b5bfc7272af3328ff7373a7a05ac19f897612467cb35d96f74f6b4ec413627ecea12293ee86f0a8f3c90ac7d36a0d7bf7f333b2a9a2fa4553eaaf
-
SSDEEP
1536:ZW/V0TQBgiXiH/J4X7aMZ46L5dxYU9+uMCjgr:YLBgiXiB4X2ef/xyeMr
Static task
static1
Behavioral task
behavioral1
Sample
9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd
-
Size
65KB
-
MD5
28e166ea1a60fd07f270a3d4487c70a5
-
SHA1
c9df59b84e6983c25ba362dd321e93feacc0c7db
-
SHA256
9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd
-
SHA512
1f77a0ae973b5bfc7272af3328ff7373a7a05ac19f897612467cb35d96f74f6b4ec413627ecea12293ee86f0a8f3c90ac7d36a0d7bf7f333b2a9a2fa4553eaaf
-
SSDEEP
1536:ZW/V0TQBgiXiH/J4X7aMZ46L5dxYU9+uMCjgr:YLBgiXiB4X2ef/xyeMr
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5