General
-
Target
504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04
-
Size
585KB
-
Sample
241227-1vdrba1jat
-
MD5
aaf187a9a44f4c6da491802c6d3a0dac
-
SHA1
394c07c73b3716ae44a384ee9111d9382cc1ea77
-
SHA256
504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04
-
SHA512
f06be0a329598007ea34f974f534f4f11cbe16143117b4adce27c1b84bb948c958b35b35ca3ff83387edfa7138b6d210393bdbe7b0f63acad36b975ea179c775
-
SSDEEP
12288:mrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUxsVOmo8m5DVG:MZyCA8CBmn+RrNj9ay5tOmUDVG
Static task
static1
Behavioral task
behavioral1
Sample
504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04
-
Size
585KB
-
MD5
aaf187a9a44f4c6da491802c6d3a0dac
-
SHA1
394c07c73b3716ae44a384ee9111d9382cc1ea77
-
SHA256
504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04
-
SHA512
f06be0a329598007ea34f974f534f4f11cbe16143117b4adce27c1b84bb948c958b35b35ca3ff83387edfa7138b6d210393bdbe7b0f63acad36b975ea179c775
-
SSDEEP
12288:mrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUxsVOmo8m5DVG:MZyCA8CBmn+RrNj9ay5tOmUDVG
-
Modifies firewall policy service
-
Sality family
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5