General
-
Target
580963743f5271d40ea6c5c83f4adda05ebf5d346feb6959f5514c0acf0efd5b.exe
-
Size
69KB
-
Sample
241226-lh4dwasjgv
-
MD5
6a1aead45e2f7b2af7ad484f7ef1455b
-
SHA1
d878f2b3915df32272ca864bb1c5acd03d2b3a93
-
SHA256
580963743f5271d40ea6c5c83f4adda05ebf5d346feb6959f5514c0acf0efd5b
-
SHA512
7f4fc5d356c172af0e46045bb9a8f440204a59ea247a2b4702b5f65f6a25d68725c54c017cceae6b86e89614b7a9fb501ce5f192b0bfb61d7085231c5d690cc7
-
SSDEEP
1536:cf40YxMzbnygJN4rV/d2o+BkAPVNOLrDpTcdewhyUL8VdkulKVw:045xMzby/Mo+BFPVNOLrDp2hyUL8XkOX
Static task
static1
Behavioral task
behavioral1
Sample
580963743f5271d40ea6c5c83f4adda05ebf5d346feb6959f5514c0acf0efd5b.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
580963743f5271d40ea6c5c83f4adda05ebf5d346feb6959f5514c0acf0efd5b.exe
-
Size
69KB
-
MD5
6a1aead45e2f7b2af7ad484f7ef1455b
-
SHA1
d878f2b3915df32272ca864bb1c5acd03d2b3a93
-
SHA256
580963743f5271d40ea6c5c83f4adda05ebf5d346feb6959f5514c0acf0efd5b
-
SHA512
7f4fc5d356c172af0e46045bb9a8f440204a59ea247a2b4702b5f65f6a25d68725c54c017cceae6b86e89614b7a9fb501ce5f192b0bfb61d7085231c5d690cc7
-
SSDEEP
1536:cf40YxMzbnygJN4rV/d2o+BkAPVNOLrDpTcdewhyUL8VdkulKVw:045xMzby/Mo+BFPVNOLrDp2hyUL8XkOX
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5