General
-
Target
82a94ea79131d3e3d84db9c1a8946917b787aeb6a31cd7585f527217d144891e
-
Size
65KB
-
Sample
250128-app92s1mcj
-
MD5
742d5c20c0a0ff93abc99db10513df73
-
SHA1
71820cd6f8ca22594b9af703fcab68eb497fdb92
-
SHA256
82a94ea79131d3e3d84db9c1a8946917b787aeb6a31cd7585f527217d144891e
-
SHA512
e53bb4be5612560d6f133669da23cc0f41fc0ea557b6cdbde0aa95adc7235a013fd9071fad3a7732781f4c00b8a05835620394939c6ad1b222dfd6234328413f
-
SSDEEP
1536:/lSg2OEWJd4ItYM8+asdNM1350TuhI1SPGJe:E7OM7GN2guhIAPh
Static task
static1
Behavioral task
behavioral1
Sample
82a94ea79131d3e3d84db9c1a8946917b787aeb6a31cd7585f527217d144891e.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
82a94ea79131d3e3d84db9c1a8946917b787aeb6a31cd7585f527217d144891e
-
Size
65KB
-
MD5
742d5c20c0a0ff93abc99db10513df73
-
SHA1
71820cd6f8ca22594b9af703fcab68eb497fdb92
-
SHA256
82a94ea79131d3e3d84db9c1a8946917b787aeb6a31cd7585f527217d144891e
-
SHA512
e53bb4be5612560d6f133669da23cc0f41fc0ea557b6cdbde0aa95adc7235a013fd9071fad3a7732781f4c00b8a05835620394939c6ad1b222dfd6234328413f
-
SSDEEP
1536:/lSg2OEWJd4ItYM8+asdNM1350TuhI1SPGJe:E7OM7GN2guhIAPh
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5