General
-
Target
1f7ec402a72007ebe6e8c5d89471e250ca27ce450182cdb0c0a113135a5b4ba8.exe
-
Size
442KB
-
Sample
241217-1s7xdazrdk
-
MD5
4ed8806b083dd1feadeca6325668479f
-
SHA1
981ea5442b04fe78935c8b5038faf19c74fb3c5e
-
SHA256
1f7ec402a72007ebe6e8c5d89471e250ca27ce450182cdb0c0a113135a5b4ba8
-
SHA512
6df3a75d05ef72ad3abc57ac1115125ba7d94c2b17bea27bcb43ae9183ad990de09db94693e506cafdd0aad77557d83ffbc6b743c3e5083ae26fc4b5762d8bbe
-
SSDEEP
6144:Q0pIAw/5hD4tHC9usgLDdVmknyUdJgJRfEGhTPabSOcagi7mOKVDJk+3dNjZ1:5+D0HC45LHnjdJ65aOnagMeU+3dj1
Static task
static1
Behavioral task
behavioral1
Sample
1f7ec402a72007ebe6e8c5d89471e250ca27ce450182cdb0c0a113135a5b4ba8.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
1f7ec402a72007ebe6e8c5d89471e250ca27ce450182cdb0c0a113135a5b4ba8.exe
-
Size
442KB
-
MD5
4ed8806b083dd1feadeca6325668479f
-
SHA1
981ea5442b04fe78935c8b5038faf19c74fb3c5e
-
SHA256
1f7ec402a72007ebe6e8c5d89471e250ca27ce450182cdb0c0a113135a5b4ba8
-
SHA512
6df3a75d05ef72ad3abc57ac1115125ba7d94c2b17bea27bcb43ae9183ad990de09db94693e506cafdd0aad77557d83ffbc6b743c3e5083ae26fc4b5762d8bbe
-
SSDEEP
6144:Q0pIAw/5hD4tHC9usgLDdVmknyUdJgJRfEGhTPabSOcagi7mOKVDJk+3dNjZ1:5+D0HC45LHnjdJ65aOnagMeU+3dj1
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5