General
-
Target
e6feff0ba5e5adc36ff5fd7924aab028f4ca4a864e1590f7999149af0cdb7facN.exe
-
Size
65KB
-
Sample
241220-dhd5zsxnax
-
MD5
a00994ebecffd0547c3a4e1b043564e0
-
SHA1
fc9f21fa4d1514e5ece42e717c6410380a8d6be4
-
SHA256
e6feff0ba5e5adc36ff5fd7924aab028f4ca4a864e1590f7999149af0cdb7fac
-
SHA512
d0a1c9b117d1ce1613ffe51ac7d779ebdba331925cbf3bd594e487abd3121c994bcab07e8a0ef3f0192bfd8f60c69969439b8844c045fda877c4e9466bb5d8cc
-
SSDEEP
1536:vE4KuoYgDAqoCDGaFEAuGaueQronI5iJtVg89oygRuy7d:0sCqa6N2lhsz194uad
Static task
static1
Behavioral task
behavioral1
Sample
e6feff0ba5e5adc36ff5fd7924aab028f4ca4a864e1590f7999149af0cdb7facN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e6feff0ba5e5adc36ff5fd7924aab028f4ca4a864e1590f7999149af0cdb7facN.exe
-
Size
65KB
-
MD5
a00994ebecffd0547c3a4e1b043564e0
-
SHA1
fc9f21fa4d1514e5ece42e717c6410380a8d6be4
-
SHA256
e6feff0ba5e5adc36ff5fd7924aab028f4ca4a864e1590f7999149af0cdb7fac
-
SHA512
d0a1c9b117d1ce1613ffe51ac7d779ebdba331925cbf3bd594e487abd3121c994bcab07e8a0ef3f0192bfd8f60c69969439b8844c045fda877c4e9466bb5d8cc
-
SSDEEP
1536:vE4KuoYgDAqoCDGaFEAuGaueQronI5iJtVg89oygRuy7d:0sCqa6N2lhsz194uad
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5