General
-
Target
ae9a2c1fdff1aaa30ed1f7838285b27168653e3f908894d1775f9e91a958245b.exe
-
Size
462KB
-
Sample
241231-h66mcstqb1
-
MD5
47400f90738a1221d5e4b025ce966f21
-
SHA1
1f56f2866ad45cbcbaafe2b8153b5d9fea6c0cdb
-
SHA256
ae9a2c1fdff1aaa30ed1f7838285b27168653e3f908894d1775f9e91a958245b
-
SHA512
957e2865202a8de2632dcdb555c28441489d26bb8d27809a10ca33df81bae6a9ba1d046d805c32dbb6600c86246ca69c68c97d86a97c0f69f619d3a2f0377eba
-
SSDEEP
12288:r7IRWDvFd+nhmuF3Y0scgeDuUlXtAVJaZ1F:r7GU7+F3YltiE0Zn
Static task
static1
Behavioral task
behavioral1
Sample
ae9a2c1fdff1aaa30ed1f7838285b27168653e3f908894d1775f9e91a958245b.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ae9a2c1fdff1aaa30ed1f7838285b27168653e3f908894d1775f9e91a958245b.exe
-
Size
462KB
-
MD5
47400f90738a1221d5e4b025ce966f21
-
SHA1
1f56f2866ad45cbcbaafe2b8153b5d9fea6c0cdb
-
SHA256
ae9a2c1fdff1aaa30ed1f7838285b27168653e3f908894d1775f9e91a958245b
-
SHA512
957e2865202a8de2632dcdb555c28441489d26bb8d27809a10ca33df81bae6a9ba1d046d805c32dbb6600c86246ca69c68c97d86a97c0f69f619d3a2f0377eba
-
SSDEEP
12288:r7IRWDvFd+nhmuF3Y0scgeDuUlXtAVJaZ1F:r7GU7+F3YltiE0Zn
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5