General
-
Target
04cdf9972803a3ca62d0799868921f3727d15b6a89325e69ab9386910ea1d43d
-
Size
361KB
-
Sample
241230-xwhvwaxjft
-
MD5
f10fd296b99bff4da1fbc7b80c5a901c
-
SHA1
f6d59f98eea031a80c58ce9ac437b9f6181fbb68
-
SHA256
04cdf9972803a3ca62d0799868921f3727d15b6a89325e69ab9386910ea1d43d
-
SHA512
7b49f50a5779d6a304c28d7a9b27d68b397d0c548cc777bcde6cee0b565ac7ed68344f5c85fac542dbbd48bed6e9bba96617bfc763146147561f38be8a1d5bdf
-
SSDEEP
6144:l2TV1wBuGKyaROfTgoGcJ25GUUCDHGJuMqjh6NG3q3p+ry28c8d/8kK:sbFA0oNYGUUEb0NG3lrgcQ/NK
Behavioral task
behavioral1
Sample
04cdf9972803a3ca62d0799868921f3727d15b6a89325e69ab9386910ea1d43d.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
04cdf9972803a3ca62d0799868921f3727d15b6a89325e69ab9386910ea1d43d
-
Size
361KB
-
MD5
f10fd296b99bff4da1fbc7b80c5a901c
-
SHA1
f6d59f98eea031a80c58ce9ac437b9f6181fbb68
-
SHA256
04cdf9972803a3ca62d0799868921f3727d15b6a89325e69ab9386910ea1d43d
-
SHA512
7b49f50a5779d6a304c28d7a9b27d68b397d0c548cc777bcde6cee0b565ac7ed68344f5c85fac542dbbd48bed6e9bba96617bfc763146147561f38be8a1d5bdf
-
SSDEEP
6144:l2TV1wBuGKyaROfTgoGcJ25GUUCDHGJuMqjh6NG3q3p+ry28c8d/8kK:sbFA0oNYGUUEb0NG3lrgcQ/NK
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5