General
-
Target
83dd64450a21d0ac336904e4dcdbd424ea1a1610c70cc38f8b3fb9b96b8e0fa5
-
Size
195KB
-
Sample
241216-ajyn8swlal
-
MD5
65b5b47deecbd805fc71f2a46c642bd6
-
SHA1
b690629f6e28910fb808cc9a319d5398e36dbbfd
-
SHA256
83dd64450a21d0ac336904e4dcdbd424ea1a1610c70cc38f8b3fb9b96b8e0fa5
-
SHA512
8f32a0ff85caf008c8bab23dc2a25cd5a89f233f5ca265bd55f802aed51610b9a0aaa4d529f6c64ed435078f798820878799724233c66b3a76bf704c0a892406
-
SSDEEP
6144:Mf1toUY8hx0ZJTL47d3IFI1G8BnWS6F60Xlx:M99x0ZJTL47N3ANFllx
Static task
static1
Behavioral task
behavioral1
Sample
83dd64450a21d0ac336904e4dcdbd424ea1a1610c70cc38f8b3fb9b96b8e0fa5.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
83dd64450a21d0ac336904e4dcdbd424ea1a1610c70cc38f8b3fb9b96b8e0fa5
-
Size
195KB
-
MD5
65b5b47deecbd805fc71f2a46c642bd6
-
SHA1
b690629f6e28910fb808cc9a319d5398e36dbbfd
-
SHA256
83dd64450a21d0ac336904e4dcdbd424ea1a1610c70cc38f8b3fb9b96b8e0fa5
-
SHA512
8f32a0ff85caf008c8bab23dc2a25cd5a89f233f5ca265bd55f802aed51610b9a0aaa4d529f6c64ed435078f798820878799724233c66b3a76bf704c0a892406
-
SSDEEP
6144:Mf1toUY8hx0ZJTL47d3IFI1G8BnWS6F60Xlx:M99x0ZJTL47N3ANFllx
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5