General
-
Target
8c04e02e99060047d533af60221647eaae3501e4b5f33000af65d0be339e7cb4N.exe
-
Size
100KB
-
Sample
241226-f5972sxrcj
-
MD5
fd01f2eaa7a511ecba55b6942c5595b0
-
SHA1
3ab8e9b139d37c7133494529c5c582fd6a84a507
-
SHA256
8c04e02e99060047d533af60221647eaae3501e4b5f33000af65d0be339e7cb4
-
SHA512
9cc222ad8711d7dcc52095a89b115d8ff1931644e13c582a249ec306d46e726f85bfeb1f793fda5dcbb2d3dc7d7be0f78475f619b9a0a1926d042199177f6339
-
SSDEEP
3072:B43Q+4tTi+URK4iL53q+hMaWJEugzN/Gqn:B2QORE3qlDEugBbn
Static task
static1
Behavioral task
behavioral1
Sample
8c04e02e99060047d533af60221647eaae3501e4b5f33000af65d0be339e7cb4N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
8c04e02e99060047d533af60221647eaae3501e4b5f33000af65d0be339e7cb4N.exe
-
Size
100KB
-
MD5
fd01f2eaa7a511ecba55b6942c5595b0
-
SHA1
3ab8e9b139d37c7133494529c5c582fd6a84a507
-
SHA256
8c04e02e99060047d533af60221647eaae3501e4b5f33000af65d0be339e7cb4
-
SHA512
9cc222ad8711d7dcc52095a89b115d8ff1931644e13c582a249ec306d46e726f85bfeb1f793fda5dcbb2d3dc7d7be0f78475f619b9a0a1926d042199177f6339
-
SSDEEP
3072:B43Q+4tTi+URK4iL53q+hMaWJEugzN/Gqn:B2QORE3qlDEugBbn
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5