General
-
Target
c8b217ce20aeead9383d22375de5345a5a02bc706c5d6712740f84bc2e33dcf4
-
Size
1.2MB
-
Sample
241225-vaxe2aynhy
-
MD5
612d3f71075dde895cdeec5ddb40c29d
-
SHA1
e1ca5fe50ecc437476a3c3e93c9541d42d1b917e
-
SHA256
c8b217ce20aeead9383d22375de5345a5a02bc706c5d6712740f84bc2e33dcf4
-
SHA512
e71ea694c0cd2d182dec25d537069bc7ae219d6450fdf4bfd558e288aaa6f989f690c9933cb079bdee32087c67a60493be37adadc7d5312500b4c98bb131bf8d
-
SSDEEP
24576:8EvVxo2ivb4YLWFTggTPoICcQw0EqeZlrTtGNP+0TkFP4S86RDFMGGmMoD:8Efozb4YLWFTgHICcQwPZFtGNP+0TYPn
Static task
static1
Behavioral task
behavioral1
Sample
c8b217ce20aeead9383d22375de5345a5a02bc706c5d6712740f84bc2e33dcf4.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c8b217ce20aeead9383d22375de5345a5a02bc706c5d6712740f84bc2e33dcf4
-
Size
1.2MB
-
MD5
612d3f71075dde895cdeec5ddb40c29d
-
SHA1
e1ca5fe50ecc437476a3c3e93c9541d42d1b917e
-
SHA256
c8b217ce20aeead9383d22375de5345a5a02bc706c5d6712740f84bc2e33dcf4
-
SHA512
e71ea694c0cd2d182dec25d537069bc7ae219d6450fdf4bfd558e288aaa6f989f690c9933cb079bdee32087c67a60493be37adadc7d5312500b4c98bb131bf8d
-
SSDEEP
24576:8EvVxo2ivb4YLWFTggTPoICcQw0EqeZlrTtGNP+0TkFP4S86RDFMGGmMoD:8Efozb4YLWFTgHICcQwPZFtGNP+0TYPn
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5