General
-
Target
7e2cd8bef71606cca4410b8a09b0a955b9632c484a8ad78c13c46f67692edbe8N.exe
-
Size
65KB
-
Sample
250202-bmr7asymhv
-
MD5
5ce63dd27d776eb4e274981adef121f0
-
SHA1
b101adaf1a25e570ea458645a2620b9b11ac1b7d
-
SHA256
7e2cd8bef71606cca4410b8a09b0a955b9632c484a8ad78c13c46f67692edbe8
-
SHA512
5cee397eb983596316bd1a417ab8a890ef6cb5ebdd7a80ee098befa6490139dddfcdb5ae6b95113cac42df28202f467ec1c68abaccadeda5bad567899281da98
-
SSDEEP
1536:ncX43JvqMSpKtomiWqpTKt4X75oTr8/NWMsRRXcOsfIBB:wMSp0onLlKtqtoTmNneXcVfIz
Static task
static1
Behavioral task
behavioral1
Sample
7e2cd8bef71606cca4410b8a09b0a955b9632c484a8ad78c13c46f67692edbe8N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7e2cd8bef71606cca4410b8a09b0a955b9632c484a8ad78c13c46f67692edbe8N.exe
-
Size
65KB
-
MD5
5ce63dd27d776eb4e274981adef121f0
-
SHA1
b101adaf1a25e570ea458645a2620b9b11ac1b7d
-
SHA256
7e2cd8bef71606cca4410b8a09b0a955b9632c484a8ad78c13c46f67692edbe8
-
SHA512
5cee397eb983596316bd1a417ab8a890ef6cb5ebdd7a80ee098befa6490139dddfcdb5ae6b95113cac42df28202f467ec1c68abaccadeda5bad567899281da98
-
SSDEEP
1536:ncX43JvqMSpKtomiWqpTKt4X75oTr8/NWMsRRXcOsfIBB:wMSp0onLlKtqtoTmNneXcVfIz
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5