General
-
Target
8883fae02b462b4a707035d551a715de7c5734951da05f47860a8f06667c75db.exe
-
Size
92KB
-
Sample
241230-wep27atrdt
-
MD5
e81fdc2dd99c27ac00b6d189400045b3
-
SHA1
329520b6303ac2afddde4de13601f39a7ee24fff
-
SHA256
8883fae02b462b4a707035d551a715de7c5734951da05f47860a8f06667c75db
-
SHA512
391d53073603e2c3e5515a474a09c81fd1e9670eee0e2cb8a89cfb7e43c5e1e4504a399494957fff8761c79ba78b80d10de81df15c2d7c79e6a5dcfadbc24def
-
SSDEEP
1536:Grejjtr5s68GTBPUK5UMGjqeXugP5rU33dlhkM7hBfASWJWp/lrb+g3dhv:AgjR5s68G1chMG/P52pIShpN+Ez
Static task
static1
Behavioral task
behavioral1
Sample
8883fae02b462b4a707035d551a715de7c5734951da05f47860a8f06667c75db.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8883fae02b462b4a707035d551a715de7c5734951da05f47860a8f06667c75db.exe
-
Size
92KB
-
MD5
e81fdc2dd99c27ac00b6d189400045b3
-
SHA1
329520b6303ac2afddde4de13601f39a7ee24fff
-
SHA256
8883fae02b462b4a707035d551a715de7c5734951da05f47860a8f06667c75db
-
SHA512
391d53073603e2c3e5515a474a09c81fd1e9670eee0e2cb8a89cfb7e43c5e1e4504a399494957fff8761c79ba78b80d10de81df15c2d7c79e6a5dcfadbc24def
-
SSDEEP
1536:Grejjtr5s68GTBPUK5UMGjqeXugP5rU33dlhkM7hBfASWJWp/lrb+g3dhv:AgjR5s68G1chMG/P52pIShpN+Ez
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5