General
-
Target
166c95f9a63be41469d83ca380d6f60e17d950f9bf5574feed219a235decade2N.exe
-
Size
65KB
-
Sample
241206-k3s8zawkar
-
MD5
4cc3640c67c43c5ce3c753bdbe8c9d50
-
SHA1
22aa8f4a9d1d2253c0060a3441f7a0d959e1bbe8
-
SHA256
166c95f9a63be41469d83ca380d6f60e17d950f9bf5574feed219a235decade2
-
SHA512
27e2b659d46b59f0e7e62af5d88e79e9337c1e232737b753912e91eac46d2cb7174d39971c97ddd1ced89e637d498f5080c890e6b49d34b1a56d891885991bb7
-
SSDEEP
1536:rn7QrsFuGgWQ+W3EjL0PIwSxmcxrvpstk6SxXwWSFxY:rncrscGgzk0PxSxNl+tk6SgWS/Y
Static task
static1
Behavioral task
behavioral1
Sample
166c95f9a63be41469d83ca380d6f60e17d950f9bf5574feed219a235decade2N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
166c95f9a63be41469d83ca380d6f60e17d950f9bf5574feed219a235decade2N.exe
-
Size
65KB
-
MD5
4cc3640c67c43c5ce3c753bdbe8c9d50
-
SHA1
22aa8f4a9d1d2253c0060a3441f7a0d959e1bbe8
-
SHA256
166c95f9a63be41469d83ca380d6f60e17d950f9bf5574feed219a235decade2
-
SHA512
27e2b659d46b59f0e7e62af5d88e79e9337c1e232737b753912e91eac46d2cb7174d39971c97ddd1ced89e637d498f5080c890e6b49d34b1a56d891885991bb7
-
SSDEEP
1536:rn7QrsFuGgWQ+W3EjL0PIwSxmcxrvpstk6SxXwWSFxY:rncrscGgzk0PxSxNl+tk6SgWS/Y
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5