General
-
Target
4921e2bc6bd359bb7969226f8dc0c73e2a32934890045cfb158f7099dc3c6da9N.exe
-
Size
65KB
-
Sample
250201-vxyxdatrgp
-
MD5
ff6daf9404e7fe9d03f5d29f21c5de80
-
SHA1
cad46ea6fbfbc394257e9451ab30e8a9e0cd9c30
-
SHA256
4921e2bc6bd359bb7969226f8dc0c73e2a32934890045cfb158f7099dc3c6da9
-
SHA512
ce08e5ed29d5a90d094cb078690e8e7b04bf841d95084de7f9cf1d9095e04f7e06721863c00c952b1edfdb3c0339ffce94ecf9481ca4fb96f3d7f7bf683bc492
-
SSDEEP
1536:+PpzLJh7PXrM9/SKjvIPDMsCNm1G0+AcSor0:+PpzrjrKrIP3CNm1GPAGg
Static task
static1
Behavioral task
behavioral1
Sample
4921e2bc6bd359bb7969226f8dc0c73e2a32934890045cfb158f7099dc3c6da9N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4921e2bc6bd359bb7969226f8dc0c73e2a32934890045cfb158f7099dc3c6da9N.exe
-
Size
65KB
-
MD5
ff6daf9404e7fe9d03f5d29f21c5de80
-
SHA1
cad46ea6fbfbc394257e9451ab30e8a9e0cd9c30
-
SHA256
4921e2bc6bd359bb7969226f8dc0c73e2a32934890045cfb158f7099dc3c6da9
-
SHA512
ce08e5ed29d5a90d094cb078690e8e7b04bf841d95084de7f9cf1d9095e04f7e06721863c00c952b1edfdb3c0339ffce94ecf9481ca4fb96f3d7f7bf683bc492
-
SSDEEP
1536:+PpzLJh7PXrM9/SKjvIPDMsCNm1G0+AcSor0:+PpzrjrKrIP3CNm1GPAGg
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5