General
-
Target
47f603421a621f5cf1084737819e9cf47b51499dfa6aa7f169fcddd20d0eb8acN.exe
-
Size
65KB
-
Sample
241206-q8xfgazrex
-
MD5
c3708f1a68fb240e5846813ce0dc9cb0
-
SHA1
9f57e8b6846d88f45bfd1a03f4a58b3e371e3abf
-
SHA256
47f603421a621f5cf1084737819e9cf47b51499dfa6aa7f169fcddd20d0eb8ac
-
SHA512
995b64c84b6f22844b68e47c7f4cd7b9dc83a63a99df0f2837b3586744fa3af96ec7b4c9433302597d8afe2670d1af585ec5a655497152e9e231993800f36631
-
SSDEEP
1536:h1YVkRhXe6IOmGmttwvDB/9CQ+nDx1JnzNLnN6P:h1fRde6PR8wfClLnN4
Static task
static1
Behavioral task
behavioral1
Sample
47f603421a621f5cf1084737819e9cf47b51499dfa6aa7f169fcddd20d0eb8acN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
47f603421a621f5cf1084737819e9cf47b51499dfa6aa7f169fcddd20d0eb8acN.exe
-
Size
65KB
-
MD5
c3708f1a68fb240e5846813ce0dc9cb0
-
SHA1
9f57e8b6846d88f45bfd1a03f4a58b3e371e3abf
-
SHA256
47f603421a621f5cf1084737819e9cf47b51499dfa6aa7f169fcddd20d0eb8ac
-
SHA512
995b64c84b6f22844b68e47c7f4cd7b9dc83a63a99df0f2837b3586744fa3af96ec7b4c9433302597d8afe2670d1af585ec5a655497152e9e231993800f36631
-
SSDEEP
1536:h1YVkRhXe6IOmGmttwvDB/9CQ+nDx1JnzNLnN6P:h1fRde6PR8wfClLnN4
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5