General
-
Target
f41a47ef01851edd8c7d69f3d3cee4f53c89ea117242140c23af09869af7125dN.exe
-
Size
145KB
-
Sample
241226-t1l7bazrdy
-
MD5
05c80a70bab42e99dfaf29d89ee0da80
-
SHA1
3bf6b60a5828490793961371b6d208028bc6f281
-
SHA256
f41a47ef01851edd8c7d69f3d3cee4f53c89ea117242140c23af09869af7125d
-
SHA512
43eb21623f1833501e160635cd1c32cf22c491cb1eefb3677fadc056b8d1a0aacf1f0c9354bb398a4aebaeab6d334f1e5f4f21b5dc66c53cc604606f2078774f
-
SSDEEP
1536:vxonVDli/waNXpFEQbLOC6sk1wODDGW6BtPcCSEi3h977b6zV80R3jrNRs+nJmZ0:vx6o/7r/bx4DDGWItPcn7SJQ+8iS8H2c
Static task
static1
Behavioral task
behavioral1
Sample
f41a47ef01851edd8c7d69f3d3cee4f53c89ea117242140c23af09869af7125dN.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f41a47ef01851edd8c7d69f3d3cee4f53c89ea117242140c23af09869af7125dN.exe
-
Size
145KB
-
MD5
05c80a70bab42e99dfaf29d89ee0da80
-
SHA1
3bf6b60a5828490793961371b6d208028bc6f281
-
SHA256
f41a47ef01851edd8c7d69f3d3cee4f53c89ea117242140c23af09869af7125d
-
SHA512
43eb21623f1833501e160635cd1c32cf22c491cb1eefb3677fadc056b8d1a0aacf1f0c9354bb398a4aebaeab6d334f1e5f4f21b5dc66c53cc604606f2078774f
-
SSDEEP
1536:vxonVDli/waNXpFEQbLOC6sk1wODDGW6BtPcCSEi3h977b6zV80R3jrNRs+nJmZ0:vx6o/7r/bx4DDGWItPcn7SJQ+8iS8H2c
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5