General
-
Target
833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27
-
Size
2.0MB
-
Sample
241230-r6j8ssxnhq
-
MD5
e73844e700be25fffb140418bc615376
-
SHA1
dd63656749c9b092539680cc18f498c297e6058b
-
SHA256
833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27
-
SHA512
263db135089edb78dad9cbf11dd50bc90cd95b5d66603fdfee60c805423ea13b9d511155b9bac38084e81ac3a0526e832d954a78ba7df42b0f3685dd328fe651
-
SSDEEP
49152:OXzGbLRjLbunYVCHn+EF+/h7lOQ9I8oHyo4vpUosRXChB:OIVjLaYVCHp+/Blr90SoyaRXCb
Static task
static1
Behavioral task
behavioral1
Sample
833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27
-
Size
2.0MB
-
MD5
e73844e700be25fffb140418bc615376
-
SHA1
dd63656749c9b092539680cc18f498c297e6058b
-
SHA256
833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27
-
SHA512
263db135089edb78dad9cbf11dd50bc90cd95b5d66603fdfee60c805423ea13b9d511155b9bac38084e81ac3a0526e832d954a78ba7df42b0f3685dd328fe651
-
SSDEEP
49152:OXzGbLRjLbunYVCHn+EF+/h7lOQ9I8oHyo4vpUosRXChB:OIVjLaYVCHp+/Blr90SoyaRXCb
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5