General
-
Target
936b063092ad7eef02011bb8225696e4d90ad6119e6dadec59fbdd6707b248fc
-
Size
198KB
-
Sample
241203-y17v8sxnej
-
MD5
a206e64de7aa3a0dd7fa6c455570a8c6
-
SHA1
a183a30c19c9b51b631944fbe4f8d90ffaea5d10
-
SHA256
936b063092ad7eef02011bb8225696e4d90ad6119e6dadec59fbdd6707b248fc
-
SHA512
d3aa892abe3909c3f6eb0680fc42d50841eaaf2c102d2a66944157620a80c9a4ffd09c6b7d4d29418cda9d61b804cb08d0fa84800d0b9df9b714aa932ba240a0
-
SSDEEP
6144:/psF/p/uwONct43j92U2LPjpNeVP1in+:+9pGHNu4B2UEbEP1i+
Static task
static1
Behavioral task
behavioral1
Sample
936b063092ad7eef02011bb8225696e4d90ad6119e6dadec59fbdd6707b248fc.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
936b063092ad7eef02011bb8225696e4d90ad6119e6dadec59fbdd6707b248fc
-
Size
198KB
-
MD5
a206e64de7aa3a0dd7fa6c455570a8c6
-
SHA1
a183a30c19c9b51b631944fbe4f8d90ffaea5d10
-
SHA256
936b063092ad7eef02011bb8225696e4d90ad6119e6dadec59fbdd6707b248fc
-
SHA512
d3aa892abe3909c3f6eb0680fc42d50841eaaf2c102d2a66944157620a80c9a4ffd09c6b7d4d29418cda9d61b804cb08d0fa84800d0b9df9b714aa932ba240a0
-
SSDEEP
6144:/psF/p/uwONct43j92U2LPjpNeVP1in+:+9pGHNu4B2UEbEP1i+
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5