General
-
Target
631946f141c98786460ae0068eae9c66645c79a573bd5ad7ea2adf6bb6a08c61
-
Size
806KB
-
Sample
241207-zc188axpcr
-
MD5
a74b444d04f82c2cd5449003bf9e6de0
-
SHA1
e46d4e3c449236c6146f257c4f4ba7648ab36cec
-
SHA256
631946f141c98786460ae0068eae9c66645c79a573bd5ad7ea2adf6bb6a08c61
-
SHA512
208608a29bed471f08a73eeed7120447225f58e1fba199b8c64703c591d4033b024652d02e96ac6fff126ea199fce86ce9dadde69bf61183745f9e9ab7c76588
-
SSDEEP
24576:7IXgCWSpRy0dSJVDsVu5unzqWvX185rKoUe:qWSjzSJlsQuzqW/1+rTUe
Static task
static1
Behavioral task
behavioral1
Sample
631946f141c98786460ae0068eae9c66645c79a573bd5ad7ea2adf6bb6a08c61.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
631946f141c98786460ae0068eae9c66645c79a573bd5ad7ea2adf6bb6a08c61
-
Size
806KB
-
MD5
a74b444d04f82c2cd5449003bf9e6de0
-
SHA1
e46d4e3c449236c6146f257c4f4ba7648ab36cec
-
SHA256
631946f141c98786460ae0068eae9c66645c79a573bd5ad7ea2adf6bb6a08c61
-
SHA512
208608a29bed471f08a73eeed7120447225f58e1fba199b8c64703c591d4033b024652d02e96ac6fff126ea199fce86ce9dadde69bf61183745f9e9ab7c76588
-
SSDEEP
24576:7IXgCWSpRy0dSJVDsVu5unzqWvX185rKoUe:qWSjzSJlsQuzqW/1+rTUe
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5