General
-
Target
d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed.exe
-
Size
8.7MB
-
Sample
241206-vxqk1atqen
-
MD5
aec5c0551ee6b60b93e6c077e79ba9d4
-
SHA1
45c43dd67703d05a773d1cda8724fb0e7094d2d1
-
SHA256
d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed
-
SHA512
3e797e45601775d54e1643bf17f85f61f7aadef2feb71c17f79e55648e9a0a5fa1806ed59474e5868fef200f482e67daa632cbe747945aed98c2dd5810d9fa86
-
SSDEEP
196608:YuOLrHbhonFpnMau33bP4QbS4xdKsAhqfmrze+fvLSWmF1PDX0bwc:4r7K7May3bfbSE6qfmHPKFW9
Static task
static1
Behavioral task
behavioral1
Sample
d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed.exe
-
Size
8.7MB
-
MD5
aec5c0551ee6b60b93e6c077e79ba9d4
-
SHA1
45c43dd67703d05a773d1cda8724fb0e7094d2d1
-
SHA256
d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed
-
SHA512
3e797e45601775d54e1643bf17f85f61f7aadef2feb71c17f79e55648e9a0a5fa1806ed59474e5868fef200f482e67daa632cbe747945aed98c2dd5810d9fa86
-
SSDEEP
196608:YuOLrHbhonFpnMau33bP4QbS4xdKsAhqfmrze+fvLSWmF1PDX0bwc:4r7K7May3bfbSE6qfmHPKFW9
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5