General
-
Target
8532c838d237b27edc0387a05936f774bab875ef79655c0eabaf061dedd17db1.exe
-
Size
1.2MB
-
Sample
241231-y7g86aznfq
-
MD5
b22250dfcc325407aeaf83b61db94c7b
-
SHA1
f8aac8d4a3f02bf715ff130cbd9c4ed49e0d477a
-
SHA256
8532c838d237b27edc0387a05936f774bab875ef79655c0eabaf061dedd17db1
-
SHA512
3a196f45fdbad694132b83e5de1c20daa2ee6b474cd25cbfbdc8eea8e76898830d05ad19e1966f3eb809e26ce63e6d0ccc51ce1434b3827162d23aaaa4578377
-
SSDEEP
24576:GII2mRVMuLi/mDnICLJ4gxqBeC7/ATDNoo3cK0Ef2gsODWdb:JmRV247qBeC7/ATDNo2+Ef2gsODcb
Static task
static1
Behavioral task
behavioral1
Sample
8532c838d237b27edc0387a05936f774bab875ef79655c0eabaf061dedd17db1.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8532c838d237b27edc0387a05936f774bab875ef79655c0eabaf061dedd17db1.exe
-
Size
1.2MB
-
MD5
b22250dfcc325407aeaf83b61db94c7b
-
SHA1
f8aac8d4a3f02bf715ff130cbd9c4ed49e0d477a
-
SHA256
8532c838d237b27edc0387a05936f774bab875ef79655c0eabaf061dedd17db1
-
SHA512
3a196f45fdbad694132b83e5de1c20daa2ee6b474cd25cbfbdc8eea8e76898830d05ad19e1966f3eb809e26ce63e6d0ccc51ce1434b3827162d23aaaa4578377
-
SSDEEP
24576:GII2mRVMuLi/mDnICLJ4gxqBeC7/ATDNoo3cK0Ef2gsODWdb:JmRV247qBeC7/ATDNo2+Ef2gsODcb
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5