General
-
Target
69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6.exe
-
Size
65KB
-
Sample
241206-x4ajgaypgm
-
MD5
11ffdfe8d48dca7a16bf86930893e262
-
SHA1
58ebaacc64707d190d29493266a25cfffa3fc5fd
-
SHA256
69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6
-
SHA512
3fb16e0283483face2c0797e9842b533d735d0844c2f56295837f674d1908a3cd8bdbd6ce4cc6e5f350c7b9949c838ddb354d9dd89f897754b0b5e7e3f17de2c
-
SSDEEP
1536:xbJzivzdj4h1WPpJVYQBPi7Or2Tb1Zas3L/G2:HcdEzWLVYQ952NZ1C2
Static task
static1
Behavioral task
behavioral1
Sample
69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6.exe
-
Size
65KB
-
MD5
11ffdfe8d48dca7a16bf86930893e262
-
SHA1
58ebaacc64707d190d29493266a25cfffa3fc5fd
-
SHA256
69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6
-
SHA512
3fb16e0283483face2c0797e9842b533d735d0844c2f56295837f674d1908a3cd8bdbd6ce4cc6e5f350c7b9949c838ddb354d9dd89f897754b0b5e7e3f17de2c
-
SSDEEP
1536:xbJzivzdj4h1WPpJVYQBPi7Or2Tb1Zas3L/G2:HcdEzWLVYQ952NZ1C2
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5