General
-
Target
7e0324626e699b3a8bd3d2cdf22ca1b13d2746afda5b069e2ebb29d9b768520c.exe
-
Size
100KB
-
Sample
241226-x5qbbawnbn
-
MD5
8ba7cd76bf3a532998c9100791ad1063
-
SHA1
7bd4ec6b1633936d31cd6664b80fa46fd131fd37
-
SHA256
7e0324626e699b3a8bd3d2cdf22ca1b13d2746afda5b069e2ebb29d9b768520c
-
SHA512
ebb5cefe5998777490301c824a3e44fbe7d42cde775330640f6f900a5bae145be965d9f766f75309a2255f676df7ff521c34ac0e8f20ae128dda6175c33f0c35
-
SSDEEP
1536:zPN+NG/MaMoTGexTYQr6p+Ns4Ak9EGUkkzLYyxSoY+aQ+5PyELQau:zV+QUoTGe9r6mHkzLYyiCpUQau
Static task
static1
Behavioral task
behavioral1
Sample
7e0324626e699b3a8bd3d2cdf22ca1b13d2746afda5b069e2ebb29d9b768520c.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
7e0324626e699b3a8bd3d2cdf22ca1b13d2746afda5b069e2ebb29d9b768520c.exe
-
Size
100KB
-
MD5
8ba7cd76bf3a532998c9100791ad1063
-
SHA1
7bd4ec6b1633936d31cd6664b80fa46fd131fd37
-
SHA256
7e0324626e699b3a8bd3d2cdf22ca1b13d2746afda5b069e2ebb29d9b768520c
-
SHA512
ebb5cefe5998777490301c824a3e44fbe7d42cde775330640f6f900a5bae145be965d9f766f75309a2255f676df7ff521c34ac0e8f20ae128dda6175c33f0c35
-
SSDEEP
1536:zPN+NG/MaMoTGexTYQr6p+Ns4Ak9EGUkkzLYyxSoY+aQ+5PyELQau:zV+QUoTGe9r6mHkzLYyiCpUQau
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5