General
-
Target
f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955dbN.exe
-
Size
65KB
-
Sample
241220-he8yeasrgq
-
MD5
5025dc2f769f6d5acec94cd018becbe0
-
SHA1
a0481a2b32bb13a762eb2858ca98809e1703d3c5
-
SHA256
f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955db
-
SHA512
8dabf5907742d200c4cd0ba6f0eb3afb7669148c2502e30c680e7d3edb8be3c7bb490fffdfd202e32507fdeedf3643570fc00564aeb94cd2fef611399ac9015f
-
SSDEEP
1536:49rZW0W4a6gLOfzuw9LKf+W75Eurm/Gut8/NGT1mnYX6KO3F:0Wn4OLM9Kf+I5ju8GjTO3F
Static task
static1
Behavioral task
behavioral1
Sample
f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955dbN.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955dbN.exe
-
Size
65KB
-
MD5
5025dc2f769f6d5acec94cd018becbe0
-
SHA1
a0481a2b32bb13a762eb2858ca98809e1703d3c5
-
SHA256
f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955db
-
SHA512
8dabf5907742d200c4cd0ba6f0eb3afb7669148c2502e30c680e7d3edb8be3c7bb490fffdfd202e32507fdeedf3643570fc00564aeb94cd2fef611399ac9015f
-
SSDEEP
1536:49rZW0W4a6gLOfzuw9LKf+W75Eurm/Gut8/NGT1mnYX6KO3F:0Wn4OLM9Kf+I5ju8GjTO3F
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5