General
-
Target
57393ebadf8b8f14a2c0f3650e2277e25180773fe391690c51668bf94e276570
-
Size
97KB
-
Sample
241220-ab7beatnfw
-
MD5
40a9e042c66c448211957b28f01ffe65
-
SHA1
8f892d0c6e9a172b8e1b2f38e3a68231e84291c8
-
SHA256
57393ebadf8b8f14a2c0f3650e2277e25180773fe391690c51668bf94e276570
-
SHA512
c8e954ca08c2d9bf505e5b06cf970045667e568b21ea5bb2f5b24681ef97cc86ae6d3a942b2b945729645551109a03c03d78ec4aba30465eac746b96a813e158
-
SSDEEP
1536:GfnJehsWoePvbFV6zmZRRhCAZKkNp8rmcLPcD2AQIUz2gulciaWZe:GfnJeOM3b2CZxjvNHMzKUz27cee
Static task
static1
Behavioral task
behavioral1
Sample
57393ebadf8b8f14a2c0f3650e2277e25180773fe391690c51668bf94e276570.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
57393ebadf8b8f14a2c0f3650e2277e25180773fe391690c51668bf94e276570
-
Size
97KB
-
MD5
40a9e042c66c448211957b28f01ffe65
-
SHA1
8f892d0c6e9a172b8e1b2f38e3a68231e84291c8
-
SHA256
57393ebadf8b8f14a2c0f3650e2277e25180773fe391690c51668bf94e276570
-
SHA512
c8e954ca08c2d9bf505e5b06cf970045667e568b21ea5bb2f5b24681ef97cc86ae6d3a942b2b945729645551109a03c03d78ec4aba30465eac746b96a813e158
-
SSDEEP
1536:GfnJehsWoePvbFV6zmZRRhCAZKkNp8rmcLPcD2AQIUz2gulciaWZe:GfnJeOM3b2CZxjvNHMzKUz27cee
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5