General
-
Target
a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b.exe
-
Size
100KB
-
Sample
241226-he3rdsyngz
-
MD5
4fd18d008652ec0810eaf854802480dc
-
SHA1
8c044c4d22b0a5b01aea5618c6b5042539da97c8
-
SHA256
a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b
-
SHA512
94592f495f0e985dc1bcc28bda5f27c422ec126474d97375b676c955b021f805d9a82dec3368925d2aa4721c17411f8d4300bc4ffa64c31bb6c057803c35fde2
-
SSDEEP
1536:LTDSk5VN/n7ChnerRIAI0qRkxUKLcnsurli1RaZY80s:dn7Wne1IxCpL2MTc5
Static task
static1
Behavioral task
behavioral1
Sample
a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b.exe
-
Size
100KB
-
MD5
4fd18d008652ec0810eaf854802480dc
-
SHA1
8c044c4d22b0a5b01aea5618c6b5042539da97c8
-
SHA256
a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b
-
SHA512
94592f495f0e985dc1bcc28bda5f27c422ec126474d97375b676c955b021f805d9a82dec3368925d2aa4721c17411f8d4300bc4ffa64c31bb6c057803c35fde2
-
SSDEEP
1536:LTDSk5VN/n7ChnerRIAI0qRkxUKLcnsurli1RaZY80s:dn7Wne1IxCpL2MTc5
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5