General
-
Target
80f0dd3db72353c9a8314e5293c4d576d781f2fc735f5052eee8f69d3b044fa3N.exe
-
Size
97KB
-
Sample
241206-yarrbszkfl
-
MD5
6909e51dd264c45037c1fee20164c880
-
SHA1
f8884e7ecbc8db857d369fc33fb84349415f6efc
-
SHA256
80f0dd3db72353c9a8314e5293c4d576d781f2fc735f5052eee8f69d3b044fa3
-
SHA512
3b23050282a525b5e86d05ee887f8bab19ca6756c8ef20cebe3f421af4290d854620644fc285491057ab2606aa6493329541bfaefa458c888614ccfe3f127f8d
-
SSDEEP
1536:hEPb71cTt54NKJnaQ5d9Fm2BDMGwl+cideuPKstWVUY0TjSUrCd:eD71caKJnn1HFtisI2YmuUed
Static task
static1
Behavioral task
behavioral1
Sample
80f0dd3db72353c9a8314e5293c4d576d781f2fc735f5052eee8f69d3b044fa3N.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
80f0dd3db72353c9a8314e5293c4d576d781f2fc735f5052eee8f69d3b044fa3N.exe
-
Size
97KB
-
MD5
6909e51dd264c45037c1fee20164c880
-
SHA1
f8884e7ecbc8db857d369fc33fb84349415f6efc
-
SHA256
80f0dd3db72353c9a8314e5293c4d576d781f2fc735f5052eee8f69d3b044fa3
-
SHA512
3b23050282a525b5e86d05ee887f8bab19ca6756c8ef20cebe3f421af4290d854620644fc285491057ab2606aa6493329541bfaefa458c888614ccfe3f127f8d
-
SSDEEP
1536:hEPb71cTt54NKJnaQ5d9Fm2BDMGwl+cideuPKstWVUY0TjSUrCd:eD71caKJnn1HFtisI2YmuUed
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5