General
-
Target
849e35dd91309b3a37c79d7f15a662953e30d066ff0af70f2933835bc2e0ea2f
-
Size
2.2MB
-
Sample
241231-aebznsxrhy
-
MD5
14bf411591fa40cec816d503b48129d9
-
SHA1
7d5811ef03d5f5dfe90748262f4c418839718fec
-
SHA256
849e35dd91309b3a37c79d7f15a662953e30d066ff0af70f2933835bc2e0ea2f
-
SHA512
c1604bd3b6eb6379f85197c4fd2f42dea0208f46ddf5b97f550baf13365b410266b5043e93dc409135f0c8a69e85d968a835656c09811de3c1c709c139460a84
-
SSDEEP
24576:t7PpqzgOiPMoi2BkTIWHusHnrdCW/4J8jDsI4s9+cfw+GeKTZlGSSBXGZbVesnkv:dpqzgwIoCnkxkV2aPY2a17oppy
Static task
static1
Behavioral task
behavioral1
Sample
849e35dd91309b3a37c79d7f15a662953e30d066ff0af70f2933835bc2e0ea2f.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
849e35dd91309b3a37c79d7f15a662953e30d066ff0af70f2933835bc2e0ea2f
-
Size
2.2MB
-
MD5
14bf411591fa40cec816d503b48129d9
-
SHA1
7d5811ef03d5f5dfe90748262f4c418839718fec
-
SHA256
849e35dd91309b3a37c79d7f15a662953e30d066ff0af70f2933835bc2e0ea2f
-
SHA512
c1604bd3b6eb6379f85197c4fd2f42dea0208f46ddf5b97f550baf13365b410266b5043e93dc409135f0c8a69e85d968a835656c09811de3c1c709c139460a84
-
SSDEEP
24576:t7PpqzgOiPMoi2BkTIWHusHnrdCW/4J8jDsI4s9+cfw+GeKTZlGSSBXGZbVesnkv:dpqzgwIoCnkxkV2aPY2a17oppy
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5