General
-
Target
14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216
-
Size
682KB
-
Sample
241215-zgmlmawnfx
-
MD5
73779e52f35163dbad48058ff828640b
-
SHA1
8e0beab00894023bf60101387c716b13d2cd5f8b
-
SHA256
14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216
-
SHA512
b77ece7ac9fab0fc1d9549b5756fa88eb571c32a38c8d4d3962a6f7d3439c9fdbbcc458b43b8488248f782dff635685f86bc536d435d1c8a2688dac665898207
-
SSDEEP
12288:dt8aYvzsldbus3mVxcFKuhCGHMhCoFkQigCxtFitM5mN6OWh:d3TGpusGsvFkQiRFUM263h
Static task
static1
Behavioral task
behavioral1
Sample
14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216
-
Size
682KB
-
MD5
73779e52f35163dbad48058ff828640b
-
SHA1
8e0beab00894023bf60101387c716b13d2cd5f8b
-
SHA256
14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216
-
SHA512
b77ece7ac9fab0fc1d9549b5756fa88eb571c32a38c8d4d3962a6f7d3439c9fdbbcc458b43b8488248f782dff635685f86bc536d435d1c8a2688dac665898207
-
SSDEEP
12288:dt8aYvzsldbus3mVxcFKuhCGHMhCoFkQigCxtFitM5mN6OWh:d3TGpusGsvFkQiRFUM263h
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5