General
-
Target
e4650e321e015588030694415b45ca7faa8258149c630b811fa2e2bb80817367
-
Size
3.2MB
-
Sample
241213-z25ypszqdk
-
MD5
fbcb39dd71b8ba62cdbe35e0be021326
-
SHA1
04425c093bf3a8b84e4610ba1880fbb2de2b38ff
-
SHA256
e4650e321e015588030694415b45ca7faa8258149c630b811fa2e2bb80817367
-
SHA512
b28e90c3cd91e58447341044f9279c3caad4b7f077720849951d3de81511a99c5435a77bb26f8f6afd691cdef05dc6c8e2ea0a330e404d6f1b0f9db10848e1f4
-
SSDEEP
49152:TJ8HrUdWYW9Ixpz8PnMRyjsleKnYFvPE6wuJs5W3DsJysvCKnHibArSvHr:98HrUEYW94pgAl4E6wuj34Ba9ArMr
Static task
static1
Behavioral task
behavioral1
Sample
e4650e321e015588030694415b45ca7faa8258149c630b811fa2e2bb80817367.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e4650e321e015588030694415b45ca7faa8258149c630b811fa2e2bb80817367
-
Size
3.2MB
-
MD5
fbcb39dd71b8ba62cdbe35e0be021326
-
SHA1
04425c093bf3a8b84e4610ba1880fbb2de2b38ff
-
SHA256
e4650e321e015588030694415b45ca7faa8258149c630b811fa2e2bb80817367
-
SHA512
b28e90c3cd91e58447341044f9279c3caad4b7f077720849951d3de81511a99c5435a77bb26f8f6afd691cdef05dc6c8e2ea0a330e404d6f1b0f9db10848e1f4
-
SSDEEP
49152:TJ8HrUdWYW9Ixpz8PnMRyjsleKnYFvPE6wuJs5W3DsJysvCKnHibArSvHr:98HrUEYW94pgAl4E6wuj34Ba9ArMr
-
Modifies firewall policy service
-
Sality family
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5