General
-
Target
44af8efae081e040fb35c9c37572870e8735143d89ea1b4fb042f97472cd9828
-
Size
791KB
-
Sample
241217-274c6sskax
-
MD5
83102617d61270f7025bb0e65dc552b9
-
SHA1
19069c32300336bc748c0876057ebb20de6b54b5
-
SHA256
44af8efae081e040fb35c9c37572870e8735143d89ea1b4fb042f97472cd9828
-
SHA512
f88ea86e7e98bd604aed3eb32a2a6d188fca03b6bab5cbc8b388753086e900e59eed269d1563d4b6192945c613a515cd425ab1a87031e45a4dbf68f4ee2d877c
-
SSDEEP
12288:V/xm0On2d8XrTtiwnyQ2NDyeh8wK2d8BWCsnMqkGFvBN4XfMIi0lTF7Txp/Tx6S:Zs28XrTqosnMBoilJnT/HASkSfo7z
Static task
static1
Behavioral task
behavioral1
Sample
44af8efae081e040fb35c9c37572870e8735143d89ea1b4fb042f97472cd9828.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
44af8efae081e040fb35c9c37572870e8735143d89ea1b4fb042f97472cd9828
-
Size
791KB
-
MD5
83102617d61270f7025bb0e65dc552b9
-
SHA1
19069c32300336bc748c0876057ebb20de6b54b5
-
SHA256
44af8efae081e040fb35c9c37572870e8735143d89ea1b4fb042f97472cd9828
-
SHA512
f88ea86e7e98bd604aed3eb32a2a6d188fca03b6bab5cbc8b388753086e900e59eed269d1563d4b6192945c613a515cd425ab1a87031e45a4dbf68f4ee2d877c
-
SSDEEP
12288:V/xm0On2d8XrTtiwnyQ2NDyeh8wK2d8BWCsnMqkGFvBN4XfMIi0lTF7Txp/Tx6S:Zs28XrTqosnMBoilJnT/HASkSfo7z
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5