General
-
Target
c6ead10fe6c342f4e83878147ebfe7731ac6c8fa7c4d5c5c3ab24a21f5f8dbb5
-
Size
3.1MB
-
Sample
241206-cx3w8a1nfq
-
MD5
945ccc3056273fc0cffbb656b5054a35
-
SHA1
e9d994719be091bbe3227df3dbe5cbdf00c2da4f
-
SHA256
c6ead10fe6c342f4e83878147ebfe7731ac6c8fa7c4d5c5c3ab24a21f5f8dbb5
-
SHA512
b53d63fb7714fac0d06212075553457ce52b5d945902491666317f3bc09a7434d2e7e95006f10755d8ec6995c561b8137123a6074c7d02b40371d35b97830fe2
-
SSDEEP
49152:GWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIPTbZ333oVs213:qtLutqgwh4NYxtJpkxhGq333ofp
Static task
static1
Behavioral task
behavioral1
Sample
c6ead10fe6c342f4e83878147ebfe7731ac6c8fa7c4d5c5c3ab24a21f5f8dbb5.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c6ead10fe6c342f4e83878147ebfe7731ac6c8fa7c4d5c5c3ab24a21f5f8dbb5
-
Size
3.1MB
-
MD5
945ccc3056273fc0cffbb656b5054a35
-
SHA1
e9d994719be091bbe3227df3dbe5cbdf00c2da4f
-
SHA256
c6ead10fe6c342f4e83878147ebfe7731ac6c8fa7c4d5c5c3ab24a21f5f8dbb5
-
SHA512
b53d63fb7714fac0d06212075553457ce52b5d945902491666317f3bc09a7434d2e7e95006f10755d8ec6995c561b8137123a6074c7d02b40371d35b97830fe2
-
SSDEEP
49152:GWGtLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIPTbZ333oVs213:qtLutqgwh4NYxtJpkxhGq333ofp
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5