General
-
Target
591ed626a8405446fc7d7c251d59d4a24c766ce5c77020713d1d063e10bd7897.exe
-
Size
1.2MB
-
Sample
241225-ypncfsvpfs
-
MD5
af11b97e5de15ec3c69f1c0c33cd376f
-
SHA1
e8ade5840c14a798b4d84f0dd22cd5beecb095f1
-
SHA256
591ed626a8405446fc7d7c251d59d4a24c766ce5c77020713d1d063e10bd7897
-
SHA512
7110c5031771e29a5bb01f87d527e180687263d89f0aa1c6eb3b05982f71d97a3385ff8ff2248c9878bd4c5a7f170536cd022dcc9434ff7d27a941cb48230dfe
-
SSDEEP
24576:NII2mRVMuLi/mDnICLJ4gxqBei7/ATDNoo3cK0Ef2gsO4KbPJ:omRV247qBei7/ATDNo2+Ef2gsO4KbPJ
Static task
static1
Behavioral task
behavioral1
Sample
591ed626a8405446fc7d7c251d59d4a24c766ce5c77020713d1d063e10bd7897.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
591ed626a8405446fc7d7c251d59d4a24c766ce5c77020713d1d063e10bd7897.exe
-
Size
1.2MB
-
MD5
af11b97e5de15ec3c69f1c0c33cd376f
-
SHA1
e8ade5840c14a798b4d84f0dd22cd5beecb095f1
-
SHA256
591ed626a8405446fc7d7c251d59d4a24c766ce5c77020713d1d063e10bd7897
-
SHA512
7110c5031771e29a5bb01f87d527e180687263d89f0aa1c6eb3b05982f71d97a3385ff8ff2248c9878bd4c5a7f170536cd022dcc9434ff7d27a941cb48230dfe
-
SSDEEP
24576:NII2mRVMuLi/mDnICLJ4gxqBei7/ATDNoo3cK0Ef2gsO4KbPJ:omRV247qBei7/ATDNo2+Ef2gsO4KbPJ
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5