General
-
Target
63613e35be0f7c3209e3b01397a790d360071e804d60fa6789372acc8988dcd4.exe
-
Size
65KB
-
Sample
241217-q5nn6a1jat
-
MD5
d6fb9978e15d0d9d5eef8b4eee3acac5
-
SHA1
fe10ee905765c27fc04c6983adcd560df6eea8de
-
SHA256
63613e35be0f7c3209e3b01397a790d360071e804d60fa6789372acc8988dcd4
-
SHA512
9116d74b9203f12844aceb11046cedf7e96d1a02b41ee6dbf23438aeef9ab3f623b85926e6056978b24609a16cc35c6d15d6229d797f4333970f17d6dde14055
-
SSDEEP
1536:oRefsfroWRLF7rvtM43zGrBJCO1/RXQR+Z7X6A8YgHPc:oRffrrNLtDqrCu4+96PDHPc
Static task
static1
Behavioral task
behavioral1
Sample
63613e35be0f7c3209e3b01397a790d360071e804d60fa6789372acc8988dcd4.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
63613e35be0f7c3209e3b01397a790d360071e804d60fa6789372acc8988dcd4.exe
-
Size
65KB
-
MD5
d6fb9978e15d0d9d5eef8b4eee3acac5
-
SHA1
fe10ee905765c27fc04c6983adcd560df6eea8de
-
SHA256
63613e35be0f7c3209e3b01397a790d360071e804d60fa6789372acc8988dcd4
-
SHA512
9116d74b9203f12844aceb11046cedf7e96d1a02b41ee6dbf23438aeef9ab3f623b85926e6056978b24609a16cc35c6d15d6229d797f4333970f17d6dde14055
-
SSDEEP
1536:oRefsfroWRLF7rvtM43zGrBJCO1/RXQR+Z7X6A8YgHPc:oRffrrNLtDqrCu4+96PDHPc
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5