General
-
Target
1fba41ce7ee3d2bf277e794008dff1299c6d9679f3949408b6d75a4624e244e8
-
Size
806KB
-
Sample
241217-272vcatkgn
-
MD5
7d5e101054c5a22fccee087db7764bd5
-
SHA1
ff95646fec16feacf1b3b3bef88e97077810541c
-
SHA256
1fba41ce7ee3d2bf277e794008dff1299c6d9679f3949408b6d75a4624e244e8
-
SHA512
0d180f1ec4699622c8819c2db29aa467fb846c80637333b3b59dfb8b7715f7f66fa3e00fd02f3c93d53e45966b00ab9788ba3c80b0dc9df8d3084584282c6cee
-
SSDEEP
12288:CITsqgmDWSpR+Gqo1gOSJVSKdet5RVu5ihnYQspCp9qWvX9fRBrGZz2AE4Y:CIXgCWSpRyodSJVDsVu5unzqWvX1D
Static task
static1
Behavioral task
behavioral1
Sample
1fba41ce7ee3d2bf277e794008dff1299c6d9679f3949408b6d75a4624e244e8.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1fba41ce7ee3d2bf277e794008dff1299c6d9679f3949408b6d75a4624e244e8
-
Size
806KB
-
MD5
7d5e101054c5a22fccee087db7764bd5
-
SHA1
ff95646fec16feacf1b3b3bef88e97077810541c
-
SHA256
1fba41ce7ee3d2bf277e794008dff1299c6d9679f3949408b6d75a4624e244e8
-
SHA512
0d180f1ec4699622c8819c2db29aa467fb846c80637333b3b59dfb8b7715f7f66fa3e00fd02f3c93d53e45966b00ab9788ba3c80b0dc9df8d3084584282c6cee
-
SSDEEP
12288:CITsqgmDWSpR+Gqo1gOSJVSKdet5RVu5ihnYQspCp9qWvX9fRBrGZz2AE4Y:CIXgCWSpRyodSJVDsVu5unzqWvX1D
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5