General
-
Target
f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467aN.exe
-
Size
97KB
-
Sample
241220-dpeebsxpby
-
MD5
de47064a338a796089e9b97ba859a8f0
-
SHA1
426410fa67f641e56f097c8fa06ab5a161e396a4
-
SHA256
f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467a
-
SHA512
a14638657a96e25f268d979892b35ed27192b3558ef8a3051ba0ea0387fc3590ac67aa2b9211d2fe31bb1a351eeac7ea48423beb2b01d9094e902e98bd406832
-
SSDEEP
3072:wDOA6HQxuSUsJt8cN24qcKwVFNKlGHvuh:w6HOV8mqc7vw6v
Static task
static1
Behavioral task
behavioral1
Sample
f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467aN.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467aN.exe
-
Size
97KB
-
MD5
de47064a338a796089e9b97ba859a8f0
-
SHA1
426410fa67f641e56f097c8fa06ab5a161e396a4
-
SHA256
f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467a
-
SHA512
a14638657a96e25f268d979892b35ed27192b3558ef8a3051ba0ea0387fc3590ac67aa2b9211d2fe31bb1a351eeac7ea48423beb2b01d9094e902e98bd406832
-
SSDEEP
3072:wDOA6HQxuSUsJt8cN24qcKwVFNKlGHvuh:w6HOV8mqc7vw6v
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5