General
-
Target
665a564fa2f48cf2e73cb0becec71cea93d400ee128f1c0213e9d72b7b258bce.exe
-
Size
97KB
-
Sample
241226-cfm5fatrej
-
MD5
7ed429650cf825ad52ee6b0c6754d575
-
SHA1
170a879ab993e77706b08fcbed39cae799e72c90
-
SHA256
665a564fa2f48cf2e73cb0becec71cea93d400ee128f1c0213e9d72b7b258bce
-
SHA512
e0d9b368e9b06ad17e492840405da9f4bb6bace3142d37280e16ce7e9d0035d5ba35482158b392537dafdaf8880646afcb7a5c916aa9bc12a20fac0d42b4a295
-
SSDEEP
1536:i6LYgmBX1QYNqLQ50rBnSVvVtPPqOgV5NRbXcxJx5eAaTGDriZquL:i68qYELQZ/PfgzXyBeAaqDriZdL
Static task
static1
Behavioral task
behavioral1
Sample
665a564fa2f48cf2e73cb0becec71cea93d400ee128f1c0213e9d72b7b258bce.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
665a564fa2f48cf2e73cb0becec71cea93d400ee128f1c0213e9d72b7b258bce.exe
-
Size
97KB
-
MD5
7ed429650cf825ad52ee6b0c6754d575
-
SHA1
170a879ab993e77706b08fcbed39cae799e72c90
-
SHA256
665a564fa2f48cf2e73cb0becec71cea93d400ee128f1c0213e9d72b7b258bce
-
SHA512
e0d9b368e9b06ad17e492840405da9f4bb6bace3142d37280e16ce7e9d0035d5ba35482158b392537dafdaf8880646afcb7a5c916aa9bc12a20fac0d42b4a295
-
SSDEEP
1536:i6LYgmBX1QYNqLQ50rBnSVvVtPPqOgV5NRbXcxJx5eAaTGDriZquL:i68qYELQZ/PfgzXyBeAaqDriZdL
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5