General
-
Target
b27973a8dca9567876bcac0151a59cd18072b13fa9d12d44245a00c58c9ffd50.exe
-
Size
65KB
-
Sample
241211-sehrbssjaj
-
MD5
94d8d6374764e142cf6b4b5292925d3a
-
SHA1
2d7c2c31acfa27a6edb03fc02c73786e12089610
-
SHA256
b27973a8dca9567876bcac0151a59cd18072b13fa9d12d44245a00c58c9ffd50
-
SHA512
6c3e6292c303918fb6753354f43bfc9f98449f8d9d6a81fa2ddbb563f1439feccf642e8258994ceba72b72f9d46f116f10b836f390206a7393e1d1ac04d77f44
-
SSDEEP
1536:PBfFwCwAgvoMJw5ZJyX3OUPX7DybY4oz1MIBUDpuEuR:fqAgvoIw5jyX3VDl46/H
Static task
static1
Behavioral task
behavioral1
Sample
b27973a8dca9567876bcac0151a59cd18072b13fa9d12d44245a00c58c9ffd50.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b27973a8dca9567876bcac0151a59cd18072b13fa9d12d44245a00c58c9ffd50.exe
-
Size
65KB
-
MD5
94d8d6374764e142cf6b4b5292925d3a
-
SHA1
2d7c2c31acfa27a6edb03fc02c73786e12089610
-
SHA256
b27973a8dca9567876bcac0151a59cd18072b13fa9d12d44245a00c58c9ffd50
-
SHA512
6c3e6292c303918fb6753354f43bfc9f98449f8d9d6a81fa2ddbb563f1439feccf642e8258994ceba72b72f9d46f116f10b836f390206a7393e1d1ac04d77f44
-
SSDEEP
1536:PBfFwCwAgvoMJw5ZJyX3OUPX7DybY4oz1MIBUDpuEuR:fqAgvoIw5jyX3VDl46/H
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5