General
-
Target
15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb
-
Size
156KB
-
Sample
241206-h45x2ssjel
-
MD5
c4ab616834b5afbb985d2ec4f5195e16
-
SHA1
0fa3fe1beec3dad05dd5fbd8419a76c59ef6aaa3
-
SHA256
15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb
-
SHA512
288cb0aa751b1e2ce4795e60548e497aeaee8a09876ee407df7a0cb8655364075776d09cdc87af769c347fc9b8fe75e115ea6d89ee6f8935bffc97d9df272fec
-
SSDEEP
3072:iYyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMiG:i8nXH+TePo8k9qUJdXAIeNQjVd7m
Static task
static1
Behavioral task
behavioral1
Sample
15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb
-
Size
156KB
-
MD5
c4ab616834b5afbb985d2ec4f5195e16
-
SHA1
0fa3fe1beec3dad05dd5fbd8419a76c59ef6aaa3
-
SHA256
15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb
-
SHA512
288cb0aa751b1e2ce4795e60548e497aeaee8a09876ee407df7a0cb8655364075776d09cdc87af769c347fc9b8fe75e115ea6d89ee6f8935bffc97d9df272fec
-
SSDEEP
3072:iYyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMiG:i8nXH+TePo8k9qUJdXAIeNQjVd7m
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5