General
-
Target
bcdf35f977c5576403005c6d22dd727033f17f57430a6b1072a6a4b02b74c146.exe
-
Size
3.1MB
-
Sample
241203-xxfrxayrgv
-
MD5
5f037f5a3e4afc92b336074f9b333000
-
SHA1
53bb77fb889fc539580471b5187208702fa8e4ad
-
SHA256
bcdf35f977c5576403005c6d22dd727033f17f57430a6b1072a6a4b02b74c146
-
SHA512
d6b2316129ee956124e2a32b546656e42e793853d02e1bdd4d786d2bfcbb08cf1451cf77bd84c8f7f4de27bd053d8943012121a05cb70596079b5903982fb4cb
-
SSDEEP
49152:Xdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTvTEjT333TYdFx:8HDYsqiPRhINnq95FoHVBa333TK
Static task
static1
Behavioral task
behavioral1
Sample
bcdf35f977c5576403005c6d22dd727033f17f57430a6b1072a6a4b02b74c146.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
bcdf35f977c5576403005c6d22dd727033f17f57430a6b1072a6a4b02b74c146.exe
-
Size
3.1MB
-
MD5
5f037f5a3e4afc92b336074f9b333000
-
SHA1
53bb77fb889fc539580471b5187208702fa8e4ad
-
SHA256
bcdf35f977c5576403005c6d22dd727033f17f57430a6b1072a6a4b02b74c146
-
SHA512
d6b2316129ee956124e2a32b546656e42e793853d02e1bdd4d786d2bfcbb08cf1451cf77bd84c8f7f4de27bd053d8943012121a05cb70596079b5903982fb4cb
-
SSDEEP
49152:Xdx4HDQNJL0VR6SgMt+k4RiP+RmXMjiINiMq95FoHVHNTvTEjT333TYdFx:8HDYsqiPRhINnq95FoHVBa333TK
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5