General
-
Target
9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1N.exe
-
Size
65KB
-
Sample
241220-f9c34s1kgw
-
MD5
e06c090b33a056ac8658d5b07dec0ec0
-
SHA1
bbde8e7b168cb6ce668473d8be579b23dd629b89
-
SHA256
9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1
-
SHA512
783dc5c60e50f06231ea2a8bf51d50043cfa0394862b4ad3015318f8d7a5a5697511bf784a262efb86cf4a83f90343f121b3766e11d12cb5ffc7ecda66df8f46
-
SSDEEP
1536:g+gUTdrvRQMTYGz5lgwAMo4nMz7Q7sVNXFBVhCHiEzNXytnc6cu:vgUTswdONLIMz07sVVzVhCHBNXytH
Static task
static1
Behavioral task
behavioral1
Sample
9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1N.exe
-
Size
65KB
-
MD5
e06c090b33a056ac8658d5b07dec0ec0
-
SHA1
bbde8e7b168cb6ce668473d8be579b23dd629b89
-
SHA256
9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1
-
SHA512
783dc5c60e50f06231ea2a8bf51d50043cfa0394862b4ad3015318f8d7a5a5697511bf784a262efb86cf4a83f90343f121b3766e11d12cb5ffc7ecda66df8f46
-
SSDEEP
1536:g+gUTdrvRQMTYGz5lgwAMo4nMz7Q7sVNXFBVhCHiEzNXytnc6cu:vgUTswdONLIMz07sVVzVhCHBNXytH
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5