General
-
Target
ac07488db4bed13911cd46d6b731f630447fdd2331f83da57f7c37080cb30bd9.exe
-
Size
142KB
-
Sample
241207-ksrbmavndx
-
MD5
201a9dc31bf97d055184bd2bf3676116
-
SHA1
19a37de6611646f02d050988a2f006983cadf6c6
-
SHA256
ac07488db4bed13911cd46d6b731f630447fdd2331f83da57f7c37080cb30bd9
-
SHA512
db2601cbba369276fec8c7f9bbdf5b840b5ec3228f9ea5cd2f53466af165c1c728e7da12c1c127f5e75af5f0d009521795a82de0750be5810ee92c49f9405e65
-
SSDEEP
3072:5XyMOpvplBfFOW4L0ZhcmTsBYMl3hykFXOZw/ixpjXZga:ZyMOphlzCehc8qYKXW3X
Static task
static1
Behavioral task
behavioral1
Sample
ac07488db4bed13911cd46d6b731f630447fdd2331f83da57f7c37080cb30bd9.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ac07488db4bed13911cd46d6b731f630447fdd2331f83da57f7c37080cb30bd9.exe
-
Size
142KB
-
MD5
201a9dc31bf97d055184bd2bf3676116
-
SHA1
19a37de6611646f02d050988a2f006983cadf6c6
-
SHA256
ac07488db4bed13911cd46d6b731f630447fdd2331f83da57f7c37080cb30bd9
-
SHA512
db2601cbba369276fec8c7f9bbdf5b840b5ec3228f9ea5cd2f53466af165c1c728e7da12c1c127f5e75af5f0d009521795a82de0750be5810ee92c49f9405e65
-
SSDEEP
3072:5XyMOpvplBfFOW4L0ZhcmTsBYMl3hykFXOZw/ixpjXZga:ZyMOphlzCehc8qYKXW3X
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5