General
-
Target
f9438f764bb18e3de044f775d06e351013cb44843c4718536188f65177bd3d27N.exe
-
Size
65KB
-
Sample
241220-g3tyqasngk
-
MD5
caedfcc53597d56e79ff470fb9f10620
-
SHA1
76ad412286a90a142a6fe9f26f7db5c19670572c
-
SHA256
f9438f764bb18e3de044f775d06e351013cb44843c4718536188f65177bd3d27
-
SHA512
f7d8de09c254afeaa01f2eb498f763d9c3e272d0c8057985b77b798366dff8e07efa85fb672fe0d4fb87fe41d5fe493639961cd8b2752e62b812d44f6ee01dd5
-
SSDEEP
1536:s4pp97YtjpYJfTtKEvYqBGUo/I520fDZl94S3ZGDLLS:s4pp9cdYhTtK4YiGUNY2ZlOSAD6
Static task
static1
Behavioral task
behavioral1
Sample
f9438f764bb18e3de044f775d06e351013cb44843c4718536188f65177bd3d27N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f9438f764bb18e3de044f775d06e351013cb44843c4718536188f65177bd3d27N.exe
-
Size
65KB
-
MD5
caedfcc53597d56e79ff470fb9f10620
-
SHA1
76ad412286a90a142a6fe9f26f7db5c19670572c
-
SHA256
f9438f764bb18e3de044f775d06e351013cb44843c4718536188f65177bd3d27
-
SHA512
f7d8de09c254afeaa01f2eb498f763d9c3e272d0c8057985b77b798366dff8e07efa85fb672fe0d4fb87fe41d5fe493639961cd8b2752e62b812d44f6ee01dd5
-
SSDEEP
1536:s4pp97YtjpYJfTtKEvYqBGUo/I520fDZl94S3ZGDLLS:s4pp9cdYhTtK4YiGUNY2ZlOSAD6
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5