General
-
Target
9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681N.exe
-
Size
3.7MB
-
Sample
241207-yqh45awlhq
-
MD5
3df0263434816d1f30983867c5ee4ae0
-
SHA1
6a8686987f161ef03e7088079a2c6e6a5adab485
-
SHA256
9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681
-
SHA512
fa0e884df0bb1640ab326d53fe302ef52f7cce9dea5b059c7ec109c32c5f8920a026296df6ac1e09bdf2a55aaa245598061be14142a2635f50d5930de6819784
-
SSDEEP
98304:LP6HSaC1lfCng7PAu6FNxvWbrtUTrUHOi:LP6yaefhkpNx+NcIOi
Static task
static1
Behavioral task
behavioral1
Sample
9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681N.exe
-
Size
3.7MB
-
MD5
3df0263434816d1f30983867c5ee4ae0
-
SHA1
6a8686987f161ef03e7088079a2c6e6a5adab485
-
SHA256
9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681
-
SHA512
fa0e884df0bb1640ab326d53fe302ef52f7cce9dea5b059c7ec109c32c5f8920a026296df6ac1e09bdf2a55aaa245598061be14142a2635f50d5930de6819784
-
SSDEEP
98304:LP6HSaC1lfCng7PAu6FNxvWbrtUTrUHOi:LP6yaefhkpNx+NcIOi
-
Modifies firewall policy service
-
Sality family
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5