General
-
Target
5eec89bc43e6009f5c84b052c64de7e124b4b654a0b19c5a9cbb2412996c7248
-
Size
223KB
-
Sample
250306-da6j9swtfx
-
MD5
3fa7c7ff9bb6186a647407cc5bb9b9f0
-
SHA1
afb856f18c5101efe74f3c1e85f4495ad19216fd
-
SHA256
5eec89bc43e6009f5c84b052c64de7e124b4b654a0b19c5a9cbb2412996c7248
-
SHA512
520d6ce62f806ada65583b45b7b9fa3af8fffb6e563c0517fcb19398c368564a782606216094d31e86526194f0475d6f853125154dc37c31fde58b472f29ebf2
-
SSDEEP
3072:OLvt5yCoL2nIW1cBwBkfCcTgt7b2zvx0iYRtLHv4zNOhNugiJi45kqxZ1z5wV:ODyCoL2nHxsTgtPkfSVvwmuY45DvwV
Static task
static1
Behavioral task
behavioral1
Sample
5eec89bc43e6009f5c84b052c64de7e124b4b654a0b19c5a9cbb2412996c7248.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5eec89bc43e6009f5c84b052c64de7e124b4b654a0b19c5a9cbb2412996c7248.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5eec89bc43e6009f5c84b052c64de7e124b4b654a0b19c5a9cbb2412996c7248
-
Size
223KB
-
MD5
3fa7c7ff9bb6186a647407cc5bb9b9f0
-
SHA1
afb856f18c5101efe74f3c1e85f4495ad19216fd
-
SHA256
5eec89bc43e6009f5c84b052c64de7e124b4b654a0b19c5a9cbb2412996c7248
-
SHA512
520d6ce62f806ada65583b45b7b9fa3af8fffb6e563c0517fcb19398c368564a782606216094d31e86526194f0475d6f853125154dc37c31fde58b472f29ebf2
-
SSDEEP
3072:OLvt5yCoL2nIW1cBwBkfCcTgt7b2zvx0iYRtLHv4zNOhNugiJi45kqxZ1z5wV:ODyCoL2nHxsTgtPkfSVvwmuY45DvwV
-
Modifies visibility of file extensions in Explorer
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5