General
-
Target
2ca31de53bdd16e964b4078d13d274abf5770aa580a4312bfe185330344ec048
-
Size
1.8MB
-
Sample
241203-zrxvcatndw
-
MD5
601004d7d195936811924bbe9449af55
-
SHA1
7c8e9afa47fabca1ca81640530457a3a2acf59be
-
SHA256
2ca31de53bdd16e964b4078d13d274abf5770aa580a4312bfe185330344ec048
-
SHA512
f1e370f80bafb467f2238beebc56e8390e94ab95f3cb09aa6b144dd4de223ebbfa48868cc2d9890a9c4e2361c323481e90171f611d2e1b9277533d8f01deca48
-
SSDEEP
49152:jBxrLRwxZMuG2KbqSiPkvcIT1R9psVI8jGhlcPhhxKg1OhBhWK:LLRwxZW2KzisvjT1R9psVI86hKgg1Oh9
Static task
static1
Behavioral task
behavioral1
Sample
2ca31de53bdd16e964b4078d13d274abf5770aa580a4312bfe185330344ec048.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2ca31de53bdd16e964b4078d13d274abf5770aa580a4312bfe185330344ec048
-
Size
1.8MB
-
MD5
601004d7d195936811924bbe9449af55
-
SHA1
7c8e9afa47fabca1ca81640530457a3a2acf59be
-
SHA256
2ca31de53bdd16e964b4078d13d274abf5770aa580a4312bfe185330344ec048
-
SHA512
f1e370f80bafb467f2238beebc56e8390e94ab95f3cb09aa6b144dd4de223ebbfa48868cc2d9890a9c4e2361c323481e90171f611d2e1b9277533d8f01deca48
-
SSDEEP
49152:jBxrLRwxZMuG2KbqSiPkvcIT1R9psVI8jGhlcPhhxKg1OhBhWK:LLRwxZW2KzisvjT1R9psVI86hKgg1Oh9
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5