General
-
Target
ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53.exe
-
Size
65KB
-
Sample
241207-jja3lsspht
-
MD5
904e0e1419d0ba7c08552edf51db7502
-
SHA1
6343189bbd6f43602088dab1ac9da4121ff6f6e6
-
SHA256
ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53
-
SHA512
164da518eaa8ad472cbc73a7a5f0c1dee57d2552bda1d4a07fd1312a92ddce09d809bf546920d0997f906076ec0b4ef191bb985443929805c3f9afa82c9c1718
-
SSDEEP
1536:pMeDOHN/in8oP+jz9wwoxyp0UYCe4rNgXhrs8QRJ+H1:pMEOHN/ih0NoxypT9xg5s8Qm1
Static task
static1
Behavioral task
behavioral1
Sample
ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53.exe
-
Size
65KB
-
MD5
904e0e1419d0ba7c08552edf51db7502
-
SHA1
6343189bbd6f43602088dab1ac9da4121ff6f6e6
-
SHA256
ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53
-
SHA512
164da518eaa8ad472cbc73a7a5f0c1dee57d2552bda1d4a07fd1312a92ddce09d809bf546920d0997f906076ec0b4ef191bb985443929805c3f9afa82c9c1718
-
SSDEEP
1536:pMeDOHN/in8oP+jz9wwoxyp0UYCe4rNgXhrs8QRJ+H1:pMEOHN/ih0NoxypT9xg5s8Qm1
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5