General
-
Target
d15166b59cb9ecddd29f797af5bccc121266fc828710f7fe18e4ecbefa8741f2N.exe
-
Size
97KB
-
Sample
241220-d5dgzaypbj
-
MD5
4b56dcc392b0256c267598f6d0750370
-
SHA1
2bd59198960e4116f32fd69db17b61d5e55ddc77
-
SHA256
d15166b59cb9ecddd29f797af5bccc121266fc828710f7fe18e4ecbefa8741f2
-
SHA512
f4258e3d493ed218f2ffae84224e469d9a2e3f02b5aa7f5caa5fe98733be2781a2ebc37a5d9fdeac22620dc9fb4952ad814afbc1c0c144f6010883ff3100855f
-
SSDEEP
3072:EA5PFwqs82cPlcIbteq2DZgslKQPEn4f+HV3DG:D9JPlIjRlKyggSV36
Static task
static1
Behavioral task
behavioral1
Sample
d15166b59cb9ecddd29f797af5bccc121266fc828710f7fe18e4ecbefa8741f2N.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d15166b59cb9ecddd29f797af5bccc121266fc828710f7fe18e4ecbefa8741f2N.exe
-
Size
97KB
-
MD5
4b56dcc392b0256c267598f6d0750370
-
SHA1
2bd59198960e4116f32fd69db17b61d5e55ddc77
-
SHA256
d15166b59cb9ecddd29f797af5bccc121266fc828710f7fe18e4ecbefa8741f2
-
SHA512
f4258e3d493ed218f2ffae84224e469d9a2e3f02b5aa7f5caa5fe98733be2781a2ebc37a5d9fdeac22620dc9fb4952ad814afbc1c0c144f6010883ff3100855f
-
SSDEEP
3072:EA5PFwqs82cPlcIbteq2DZgslKQPEn4f+HV3DG:D9JPlIjRlKyggSV36
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5