General
-
Target
dbbbc4334c0652ffe1b00e145c47fb6ab94a5535a71cd5aa2276491f510709f9.exe
-
Size
251KB
-
Sample
241218-mxy85sxkcj
-
MD5
b6c139fb3d208246044403199d49c9a4
-
SHA1
3888932d636deacebc4ab523a9cebc2353aa20c8
-
SHA256
dbbbc4334c0652ffe1b00e145c47fb6ab94a5535a71cd5aa2276491f510709f9
-
SHA512
7df8f6eafb5cefeb1eee734fdad03f1f04b8981e014cf5da72a69b4a9778cab47dafc8c94feb1ec6c9724754112872363024527a4c1679a61e9c3f6bec068a84
-
SSDEEP
6144:pUa1qPDlTSY/ML4EWnC9n6kOvhpJU7Wad0Lta0YlV:MTSYEUEWnClGBW0rAV
Static task
static1
Behavioral task
behavioral1
Sample
dbbbc4334c0652ffe1b00e145c47fb6ab94a5535a71cd5aa2276491f510709f9.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
dbbbc4334c0652ffe1b00e145c47fb6ab94a5535a71cd5aa2276491f510709f9.exe
-
Size
251KB
-
MD5
b6c139fb3d208246044403199d49c9a4
-
SHA1
3888932d636deacebc4ab523a9cebc2353aa20c8
-
SHA256
dbbbc4334c0652ffe1b00e145c47fb6ab94a5535a71cd5aa2276491f510709f9
-
SHA512
7df8f6eafb5cefeb1eee734fdad03f1f04b8981e014cf5da72a69b4a9778cab47dafc8c94feb1ec6c9724754112872363024527a4c1679a61e9c3f6bec068a84
-
SSDEEP
6144:pUa1qPDlTSY/ML4EWnC9n6kOvhpJU7Wad0Lta0YlV:MTSYEUEWnClGBW0rAV
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5