General
-
Target
bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718
-
Size
283KB
-
Sample
241120-dqgk3strdr
-
MD5
5df10a3a498790ca9238077ccf55de1e
-
SHA1
68f6e5aae0823ce4a82f5f0684a5a24f4d9b3581
-
SHA256
bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718
-
SHA512
f2234102502884dc8108485d78a84398b9d7e3ee14674752e21bee7ee70911292e6c712273d3db146fe1d16fd5b0ea5b74172485d3511ae620c6881d861dd8aa
-
SSDEEP
3072:wNyXpaJC/jdelKE90KmIJQ3FKrKOYHhph3Z0ojWPTKGloGjHlJ7gB968Z7/CZTHJ:myXp99z4T14KuS2MWSBFEqQDujo78
Static task
static1
Behavioral task
behavioral1
Sample
bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718
-
Size
283KB
-
MD5
5df10a3a498790ca9238077ccf55de1e
-
SHA1
68f6e5aae0823ce4a82f5f0684a5a24f4d9b3581
-
SHA256
bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718
-
SHA512
f2234102502884dc8108485d78a84398b9d7e3ee14674752e21bee7ee70911292e6c712273d3db146fe1d16fd5b0ea5b74172485d3511ae620c6881d861dd8aa
-
SSDEEP
3072:wNyXpaJC/jdelKE90KmIJQ3FKrKOYHhph3Z0ojWPTKGloGjHlJ7gB968Z7/CZTHJ:myXp99z4T14KuS2MWSBFEqQDujo78
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5