General
-
Target
d0e4b97e13c1f190e6618a9ff3f9db8421c80a8ec933b1acafe7e3275400ed6c
-
Size
1.3MB
-
Sample
241203-yx4pea1rfz
-
MD5
06dd6fa8bf658d7e93534e8e7a872dfc
-
SHA1
f38229a24613ff99ef9aaf97b5392b537bb279b9
-
SHA256
d0e4b97e13c1f190e6618a9ff3f9db8421c80a8ec933b1acafe7e3275400ed6c
-
SHA512
9d84be20fbae11ee931fa0aa64cf410aae48a6b682725a0eb4a0db8f396246b5bf45f0689116c5f833bd3544993057acdc6764ab4b85dfe89bfe535456629e43
-
SSDEEP
12288:zZbGOkQ62kjo4Iqfv64mT4BzTEHTYL2Sz8WHzsTvEqnuDnuDF54wjjP9J:h5kfjWGzASzZHQTs+ui4wXP9J
Static task
static1
Behavioral task
behavioral1
Sample
d0e4b97e13c1f190e6618a9ff3f9db8421c80a8ec933b1acafe7e3275400ed6c.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d0e4b97e13c1f190e6618a9ff3f9db8421c80a8ec933b1acafe7e3275400ed6c
-
Size
1.3MB
-
MD5
06dd6fa8bf658d7e93534e8e7a872dfc
-
SHA1
f38229a24613ff99ef9aaf97b5392b537bb279b9
-
SHA256
d0e4b97e13c1f190e6618a9ff3f9db8421c80a8ec933b1acafe7e3275400ed6c
-
SHA512
9d84be20fbae11ee931fa0aa64cf410aae48a6b682725a0eb4a0db8f396246b5bf45f0689116c5f833bd3544993057acdc6764ab4b85dfe89bfe535456629e43
-
SSDEEP
12288:zZbGOkQ62kjo4Iqfv64mT4BzTEHTYL2Sz8WHzsTvEqnuDnuDF54wjjP9J:h5kfjWGzASzZHQTs+ui4wXP9J
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5