General
-
Target
c694e60b4b311b3b73b1e1957a598ddd94b5427ecaf5877e6cdadc614a4fa695.exe
-
Size
2.2MB
-
Sample
241207-d4zc2stpcv
-
MD5
6472b718eda578b5f16102c1df86bd19
-
SHA1
521c9736c53e02e95bce2b07ac76fac618d1ddbe
-
SHA256
c694e60b4b311b3b73b1e1957a598ddd94b5427ecaf5877e6cdadc614a4fa695
-
SHA512
bcc42f744d970c5a6451f710f1f5c9a01dd77ac683793827cb26ee215e0bdbcf5cc6232054f1e22340dbe1ad17f7dc1113407f6fd629b02b4c46d3b63710a900
-
SSDEEP
49152:lIEJxCWluyZ8UbMqRD5hHghOlK6H/MHLbsz2pjO:+EJUWluyYqRD5hHghOlK6H/MHLbsz2py
Static task
static1
Behavioral task
behavioral1
Sample
c694e60b4b311b3b73b1e1957a598ddd94b5427ecaf5877e6cdadc614a4fa695.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c694e60b4b311b3b73b1e1957a598ddd94b5427ecaf5877e6cdadc614a4fa695.exe
-
Size
2.2MB
-
MD5
6472b718eda578b5f16102c1df86bd19
-
SHA1
521c9736c53e02e95bce2b07ac76fac618d1ddbe
-
SHA256
c694e60b4b311b3b73b1e1957a598ddd94b5427ecaf5877e6cdadc614a4fa695
-
SHA512
bcc42f744d970c5a6451f710f1f5c9a01dd77ac683793827cb26ee215e0bdbcf5cc6232054f1e22340dbe1ad17f7dc1113407f6fd629b02b4c46d3b63710a900
-
SSDEEP
49152:lIEJxCWluyZ8UbMqRD5hHghOlK6H/MHLbsz2pjO:+EJUWluyYqRD5hHghOlK6H/MHLbsz2py
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5