General
-
Target
51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22aN.exe
-
Size
1.2MB
-
Sample
241226-f3rmxsxqfp
-
MD5
bc84a9c36e0f9bd8eff47238ddfebbb0
-
SHA1
31d2c2a4a3f140ecff9f5adaedc8f8ba7d77a8a4
-
SHA256
51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22a
-
SHA512
1ec5a1aa3acb7b9ac9c3308db9c84c13b3c2cb3eb531ae4882f2675eb280dc69fbb0ac5dcf32cc4b0fd9a0e52d28fc54c8c33260fa0d51622296dcfc756e6261
-
SSDEEP
24576:NII2mRVMuLi/mDnICLJ4gxqBei7/ATDNoo3cK0Ef2gsO4KbPR:omRV247qBei7/ATDNo2+Ef2gsO4KbPR
Static task
static1
Behavioral task
behavioral1
Sample
51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22aN.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22aN.exe
-
Size
1.2MB
-
MD5
bc84a9c36e0f9bd8eff47238ddfebbb0
-
SHA1
31d2c2a4a3f140ecff9f5adaedc8f8ba7d77a8a4
-
SHA256
51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22a
-
SHA512
1ec5a1aa3acb7b9ac9c3308db9c84c13b3c2cb3eb531ae4882f2675eb280dc69fbb0ac5dcf32cc4b0fd9a0e52d28fc54c8c33260fa0d51622296dcfc756e6261
-
SSDEEP
24576:NII2mRVMuLi/mDnICLJ4gxqBei7/ATDNoo3cK0Ef2gsO4KbPR:omRV247qBei7/ATDNo2+Ef2gsO4KbPR
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5