General
-
Target
880cd0286974350e0a9e3c650c7e76166f030c36e113693982ae20e3da8a00c3
-
Size
1.2MB
-
Sample
241226-r4k3baxqfy
-
MD5
15fd06b9d709770d4859e6deb8225abc
-
SHA1
9a336097876f5ea514436bae39689ea60fd0208e
-
SHA256
880cd0286974350e0a9e3c650c7e76166f030c36e113693982ae20e3da8a00c3
-
SHA512
30465f4c8136364af346b1ca6a4ebe97c5f3152a8401286be52781861ebeb69d07eec44671330f0756b35b0260abf76bf22c8aeb34615a86437d412374cde5ce
-
SSDEEP
24576:tEvVxo2ivb4YLWFTggTPoICcQw0EqnZlrTtGNP+0TkFP4S86RDFMuDKAS:tEfozb4YLWFTgHICcQwOZFtGNP+0TYPw
Static task
static1
Behavioral task
behavioral1
Sample
880cd0286974350e0a9e3c650c7e76166f030c36e113693982ae20e3da8a00c3.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
880cd0286974350e0a9e3c650c7e76166f030c36e113693982ae20e3da8a00c3
-
Size
1.2MB
-
MD5
15fd06b9d709770d4859e6deb8225abc
-
SHA1
9a336097876f5ea514436bae39689ea60fd0208e
-
SHA256
880cd0286974350e0a9e3c650c7e76166f030c36e113693982ae20e3da8a00c3
-
SHA512
30465f4c8136364af346b1ca6a4ebe97c5f3152a8401286be52781861ebeb69d07eec44671330f0756b35b0260abf76bf22c8aeb34615a86437d412374cde5ce
-
SSDEEP
24576:tEvVxo2ivb4YLWFTggTPoICcQw0EqnZlrTtGNP+0TkFP4S86RDFMuDKAS:tEfozb4YLWFTgHICcQwOZFtGNP+0TYPw
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5