General
-
Target
d62278358c2a9cd35231cf891443c33783bb88eb76e07e3cb3388e060995b67c.exe
-
Size
881KB
-
Sample
241205-pjecxstqhv
-
MD5
008832d6fcd520efecf243210f44b8eb
-
SHA1
6afcb1976ea5138d303680bcc8d852102fcdd44c
-
SHA256
d62278358c2a9cd35231cf891443c33783bb88eb76e07e3cb3388e060995b67c
-
SHA512
064578dbc7dda5bb63f9545a2312547559767e4908fc96065a0fbea0d4937b8aece48e043bf78bf8a164e3fa9b85fca25ca43d924d82abdab8967f105ca84895
-
SSDEEP
24576:XyTRcTmOZv+I6XE4xOowYLHgZWJ8ncGNb:XyTCJgFNwYLHzJ8Db
Static task
static1
Behavioral task
behavioral1
Sample
d62278358c2a9cd35231cf891443c33783bb88eb76e07e3cb3388e060995b67c.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d62278358c2a9cd35231cf891443c33783bb88eb76e07e3cb3388e060995b67c.exe
-
Size
881KB
-
MD5
008832d6fcd520efecf243210f44b8eb
-
SHA1
6afcb1976ea5138d303680bcc8d852102fcdd44c
-
SHA256
d62278358c2a9cd35231cf891443c33783bb88eb76e07e3cb3388e060995b67c
-
SHA512
064578dbc7dda5bb63f9545a2312547559767e4908fc96065a0fbea0d4937b8aece48e043bf78bf8a164e3fa9b85fca25ca43d924d82abdab8967f105ca84895
-
SSDEEP
24576:XyTRcTmOZv+I6XE4xOowYLHgZWJ8ncGNb:XyTCJgFNwYLHzJ8Db
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5