General
-
Target
0708e562a519081319cbeb044024ccfb8ded104b5d735fb5516fa0a083bc97d7
-
Size
65KB
-
Sample
241229-x49nkawkc1
-
MD5
743ee0f9d3dcb868a04c10ffc1e7f5d6
-
SHA1
b3f00796f040515a743ec7ce7b89f5f778f6e639
-
SHA256
0708e562a519081319cbeb044024ccfb8ded104b5d735fb5516fa0a083bc97d7
-
SHA512
15ce4b4401e4504b5c4a6f010b448d21d5c8b125dc772b55a8eb9dff293311cfc3baccce42199787a02da7bf076de2f8ed29b254bd140876b79455e36882a83d
-
SSDEEP
1536:yTorRhY1YrUebaauYKWNhzuoWa1CHvv/FIVj:R81YrIauYJzNWa0XdC
Static task
static1
Behavioral task
behavioral1
Sample
0708e562a519081319cbeb044024ccfb8ded104b5d735fb5516fa0a083bc97d7.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0708e562a519081319cbeb044024ccfb8ded104b5d735fb5516fa0a083bc97d7
-
Size
65KB
-
MD5
743ee0f9d3dcb868a04c10ffc1e7f5d6
-
SHA1
b3f00796f040515a743ec7ce7b89f5f778f6e639
-
SHA256
0708e562a519081319cbeb044024ccfb8ded104b5d735fb5516fa0a083bc97d7
-
SHA512
15ce4b4401e4504b5c4a6f010b448d21d5c8b125dc772b55a8eb9dff293311cfc3baccce42199787a02da7bf076de2f8ed29b254bd140876b79455e36882a83d
-
SSDEEP
1536:yTorRhY1YrUebaauYKWNhzuoWa1CHvv/FIVj:R81YrIauYJzNWa0XdC
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5