General
-
Target
46479b4171fe041bd32f9411dd5966af868e32a035d5e5fd7aa52cc475adb41d
-
Size
574KB
-
Sample
241206-x17pssyndk
-
MD5
99bf438a698366730ef86629532ba2af
-
SHA1
53bb311759baf412cb71098119d412f040f4da9e
-
SHA256
46479b4171fe041bd32f9411dd5966af868e32a035d5e5fd7aa52cc475adb41d
-
SHA512
c0825944ae1b94ff76cdb0be244107a4a877ad933b75e87fd55cd6c7c2f86d4775a41e111f50dd2c479cf996b94a62d826ba4085b5b308473c045cb757ecbceb
-
SSDEEP
12288:mLXO7qAPn3Gtt10hojUBXf3SUiw+o5Za5891:cXO7qFttjjURqe9c5891
Static task
static1
Behavioral task
behavioral1
Sample
46479b4171fe041bd32f9411dd5966af868e32a035d5e5fd7aa52cc475adb41d.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
46479b4171fe041bd32f9411dd5966af868e32a035d5e5fd7aa52cc475adb41d
-
Size
574KB
-
MD5
99bf438a698366730ef86629532ba2af
-
SHA1
53bb311759baf412cb71098119d412f040f4da9e
-
SHA256
46479b4171fe041bd32f9411dd5966af868e32a035d5e5fd7aa52cc475adb41d
-
SHA512
c0825944ae1b94ff76cdb0be244107a4a877ad933b75e87fd55cd6c7c2f86d4775a41e111f50dd2c479cf996b94a62d826ba4085b5b308473c045cb757ecbceb
-
SSDEEP
12288:mLXO7qAPn3Gtt10hojUBXf3SUiw+o5Za5891:cXO7qFttjjURqe9c5891
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5