General
-
Target
b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149
-
Size
65KB
-
Sample
241220-gnn4xsslck
-
MD5
765266b321ff890624a4a91bff92ea15
-
SHA1
2e34128292b220a30fdd4755327af045be99fca9
-
SHA256
b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149
-
SHA512
dc25c05e0700ee1f467df04eac037c85796acd9a1e6dba7e2be03593a38b1ff1d37f10e925ac1dbf05c03437b62e657128de8809b9b6cb2a06fc0745257565fd
-
SSDEEP
1536:563V/mgvX6bBiSxFz/5jVHTMyeO7YtWwneq3HvRHB2ebMU7pgnn+Uq:CV/mgirH2ye3eI5HBFbj7pg+Uq
Static task
static1
Behavioral task
behavioral1
Sample
b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149
-
Size
65KB
-
MD5
765266b321ff890624a4a91bff92ea15
-
SHA1
2e34128292b220a30fdd4755327af045be99fca9
-
SHA256
b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149
-
SHA512
dc25c05e0700ee1f467df04eac037c85796acd9a1e6dba7e2be03593a38b1ff1d37f10e925ac1dbf05c03437b62e657128de8809b9b6cb2a06fc0745257565fd
-
SSDEEP
1536:563V/mgvX6bBiSxFz/5jVHTMyeO7YtWwneq3HvRHB2ebMU7pgnn+Uq:CV/mgirH2ye3eI5HBFbj7pg+Uq
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5