General
-
Target
52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86N.exe
-
Size
212KB
-
Sample
250201-tv1shsslap
-
MD5
d6b0ce968c3cf807203f48aecd811590
-
SHA1
09fcfccefe4d42a8f48b287d34c29fb3669ddf02
-
SHA256
52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86
-
SHA512
8d374a23b57fc6334b8520e8e504a822ff4bd983b695691446757f3c67feb1e5fd49b1dcf5e3607827615a2e1dc42986b887a76a4bab1e9b7ec9d4ae6107488b
-
SSDEEP
3072:c4/Wd8bsXQJl5v1l83PAUKpHqzQMyU6x2cgMRRvzcuNj5hDpqko:c4/23XQJ8IUKpHIQMyUpPMRRz1LPo
Static task
static1
Behavioral task
behavioral1
Sample
52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86N.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86N.exe
-
Size
212KB
-
MD5
d6b0ce968c3cf807203f48aecd811590
-
SHA1
09fcfccefe4d42a8f48b287d34c29fb3669ddf02
-
SHA256
52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86
-
SHA512
8d374a23b57fc6334b8520e8e504a822ff4bd983b695691446757f3c67feb1e5fd49b1dcf5e3607827615a2e1dc42986b887a76a4bab1e9b7ec9d4ae6107488b
-
SSDEEP
3072:c4/Wd8bsXQJl5v1l83PAUKpHqzQMyU6x2cgMRRvzcuNj5hDpqko:c4/23XQJ8IUKpHIQMyUpPMRRz1LPo
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6