General
-
Target
9a6bf84198089af45fbb529e48a58aba61fe233b02473d2d4d8ded4e85cb07dbN.exe
-
Size
65KB
-
Sample
241216-19xsqsspdk
-
MD5
883ab82c588a21d6a9df3fdc0fd303b0
-
SHA1
68ff846034b3d81ab2b7a5c3fc63f20ac834b9de
-
SHA256
9a6bf84198089af45fbb529e48a58aba61fe233b02473d2d4d8ded4e85cb07db
-
SHA512
250f7321f1c136e6e1c14b6871468edeaebe15d0bf51ed3ba8e0c5987ff6cf1a9275fc2a88043a665253304e8d72b7ce0085030d370a19fabe7338b7264c00ce
-
SSDEEP
768:tHLknNPxtrxHIvBJT5xc/YlE44KqTQu9kRgI7gkg1ZZJnSCVWQWRjPCAnP+B9vVO:hLkN5JyZIkR1srnJFWQWRjPDP+BvQFK0
Static task
static1
Behavioral task
behavioral1
Sample
9a6bf84198089af45fbb529e48a58aba61fe233b02473d2d4d8ded4e85cb07dbN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9a6bf84198089af45fbb529e48a58aba61fe233b02473d2d4d8ded4e85cb07dbN.exe
-
Size
65KB
-
MD5
883ab82c588a21d6a9df3fdc0fd303b0
-
SHA1
68ff846034b3d81ab2b7a5c3fc63f20ac834b9de
-
SHA256
9a6bf84198089af45fbb529e48a58aba61fe233b02473d2d4d8ded4e85cb07db
-
SHA512
250f7321f1c136e6e1c14b6871468edeaebe15d0bf51ed3ba8e0c5987ff6cf1a9275fc2a88043a665253304e8d72b7ce0085030d370a19fabe7338b7264c00ce
-
SSDEEP
768:tHLknNPxtrxHIvBJT5xc/YlE44KqTQu9kRgI7gkg1ZZJnSCVWQWRjPCAnP+B9vVO:hLkN5JyZIkR1srnJFWQWRjPDP+BvQFK0
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5