General
-
Target
55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636N.exe
-
Size
65KB
-
Sample
241216-fgmrvawphj
-
MD5
2f98db531296c984cfd6963a3b22bac0
-
SHA1
b28993f850d87fc1a069d663d999e6675991fb5f
-
SHA256
55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636
-
SHA512
246abfcb243ab30795cea28cb0820bc2a0cebf5b9d7dc5e7c439525b63b9da9a623e349dfde8e437dcbd3cab47a7a397778ade7d5876c9162e707d619782e8e2
-
SSDEEP
1536:T32vQhyTg4uGFjYhA/RwZEcL1AffcEcrp8dIKkgoYtH/8v50Ta:TP0Tx9FjYW/0fxAXcEcVfnYBk+Ta
Static task
static1
Behavioral task
behavioral1
Sample
55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636N.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636N.exe
-
Size
65KB
-
MD5
2f98db531296c984cfd6963a3b22bac0
-
SHA1
b28993f850d87fc1a069d663d999e6675991fb5f
-
SHA256
55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636
-
SHA512
246abfcb243ab30795cea28cb0820bc2a0cebf5b9d7dc5e7c439525b63b9da9a623e349dfde8e437dcbd3cab47a7a397778ade7d5876c9162e707d619782e8e2
-
SSDEEP
1536:T32vQhyTg4uGFjYhA/RwZEcL1AffcEcrp8dIKkgoYtH/8v50Ta:TP0Tx9FjYW/0fxAXcEcVfnYBk+Ta
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5