General
-
Target
cf35be171ed664d7d2bd67c211ad57a0b355ec793548bc967fa18f5b88a3d6c6
-
Size
1.2MB
-
Sample
241226-r2kzjayjcr
-
MD5
ee49f43448e6ba028af0058a2dcda426
-
SHA1
4a2ea5538611c605967232e5d1a1307e9536a314
-
SHA256
cf35be171ed664d7d2bd67c211ad57a0b355ec793548bc967fa18f5b88a3d6c6
-
SHA512
e670b4273d442fbe37873bc7f044b08538c1c6e53214d681260e7d5febe4e519ad0ae57b97e40819ffadb705544ed2a51860d040f49c82fbaccf3472d3c04594
-
SSDEEP
24576:1qo1V4IDQ1rThff+r/ibJIRYP6h95s+VlLExqWXTHRyWtv4r6PxrV4Ynk:1qoTDerQKws+vExqWXTxyWF4r6PFqIk
Static task
static1
Behavioral task
behavioral1
Sample
cf35be171ed664d7d2bd67c211ad57a0b355ec793548bc967fa18f5b88a3d6c6.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cf35be171ed664d7d2bd67c211ad57a0b355ec793548bc967fa18f5b88a3d6c6
-
Size
1.2MB
-
MD5
ee49f43448e6ba028af0058a2dcda426
-
SHA1
4a2ea5538611c605967232e5d1a1307e9536a314
-
SHA256
cf35be171ed664d7d2bd67c211ad57a0b355ec793548bc967fa18f5b88a3d6c6
-
SHA512
e670b4273d442fbe37873bc7f044b08538c1c6e53214d681260e7d5febe4e519ad0ae57b97e40819ffadb705544ed2a51860d040f49c82fbaccf3472d3c04594
-
SSDEEP
24576:1qo1V4IDQ1rThff+r/ibJIRYP6h95s+VlLExqWXTHRyWtv4r6PxrV4Ynk:1qoTDerQKws+vExqWXTxyWF4r6PFqIk
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5