General
-
Target
03a8b34f2723026f751a7a1235b5b1e636bc3b249feb544cb33f12c72ec23652
-
Size
3.8MB
-
Sample
241230-t88ehssmg1
-
MD5
e42ba647afdce9058d301f56da1b1003
-
SHA1
5a86ec5f96a21f85d8c774ea4a7998a5e5f63684
-
SHA256
03a8b34f2723026f751a7a1235b5b1e636bc3b249feb544cb33f12c72ec23652
-
SHA512
525cd7d741c7b6e2b72a5d9a78a65709ebbb16a41d3f57d437e98a90227dd43f5cb278a56b04e68aa942856fcbb498201b264f5fa294884c56d13ddb8e7d920c
-
SSDEEP
49152:LfINtH363dZShZ+IzmJCKFfbu+1S8MMjYGDTu9LK0kj3iVdzbzB7cJf9:7Sot81yoKFfbu+1S8dAK0kj3X
Static task
static1
Behavioral task
behavioral1
Sample
03a8b34f2723026f751a7a1235b5b1e636bc3b249feb544cb33f12c72ec23652.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
03a8b34f2723026f751a7a1235b5b1e636bc3b249feb544cb33f12c72ec23652
-
Size
3.8MB
-
MD5
e42ba647afdce9058d301f56da1b1003
-
SHA1
5a86ec5f96a21f85d8c774ea4a7998a5e5f63684
-
SHA256
03a8b34f2723026f751a7a1235b5b1e636bc3b249feb544cb33f12c72ec23652
-
SHA512
525cd7d741c7b6e2b72a5d9a78a65709ebbb16a41d3f57d437e98a90227dd43f5cb278a56b04e68aa942856fcbb498201b264f5fa294884c56d13ddb8e7d920c
-
SSDEEP
49152:LfINtH363dZShZ+IzmJCKFfbu+1S8MMjYGDTu9LK0kj3iVdzbzB7cJf9:7Sot81yoKFfbu+1S8dAK0kj3X
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5