General
-
Target
06937ddb22a7005b290fc8a45b712e1468606bfc03dbe064ea1b8e34411a5316.exe
-
Size
65KB
-
Sample
250202-v6r57askbv
-
MD5
5cca594c095fb580aadbe6138869ee12
-
SHA1
2f83cc972b96420021f8ad58d17297f565df4de3
-
SHA256
06937ddb22a7005b290fc8a45b712e1468606bfc03dbe064ea1b8e34411a5316
-
SHA512
434dfb9bd36584a7e029e402987c39fe60defc5f719faa83c3967d3552ca8987e276574e26a4f54a12e6933dcc3a8f071c1648f36ac6bc02c94ad24d2ea6bcd0
-
SSDEEP
1536:ncX43JvqMSpKtomiWqpTKt4X75oTr8/NWMsRRXcOsfIBr:wMSp0onLlKtqtoTmNneXcVfIR
Static task
static1
Behavioral task
behavioral1
Sample
06937ddb22a7005b290fc8a45b712e1468606bfc03dbe064ea1b8e34411a5316.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
06937ddb22a7005b290fc8a45b712e1468606bfc03dbe064ea1b8e34411a5316.exe
-
Size
65KB
-
MD5
5cca594c095fb580aadbe6138869ee12
-
SHA1
2f83cc972b96420021f8ad58d17297f565df4de3
-
SHA256
06937ddb22a7005b290fc8a45b712e1468606bfc03dbe064ea1b8e34411a5316
-
SHA512
434dfb9bd36584a7e029e402987c39fe60defc5f719faa83c3967d3552ca8987e276574e26a4f54a12e6933dcc3a8f071c1648f36ac6bc02c94ad24d2ea6bcd0
-
SSDEEP
1536:ncX43JvqMSpKtomiWqpTKt4X75oTr8/NWMsRRXcOsfIBr:wMSp0onLlKtqtoTmNneXcVfIR
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5