General
-
Target
baf3760b7900f3706171ca861604b37741884332006f4ebfe58c35f286f26a11N.exe
-
Size
65KB
-
Sample
241221-2bq3za1qdz
-
MD5
0b44981d112d9a6ea2c1f1088d8e4450
-
SHA1
82b1d2ccc214778c757c5bd95a145ffb5fa84bc1
-
SHA256
baf3760b7900f3706171ca861604b37741884332006f4ebfe58c35f286f26a11
-
SHA512
70d8196c56dadd0a02429cb620591d0d5899dd12c89d45420e28ca2db8876918426025000af518f98c6464e552475c9b5bbae75370d12879b66d1b52976acde6
-
SSDEEP
768:penS2pkYLFkMKkQDwFIDx8XjotsqLUgecNGPHDzceLbdTkSLTo/3VuRN42UlTcb:pISA3LFkMJT8LLUMYP3LbCSLcC4b2b
Static task
static1
Behavioral task
behavioral1
Sample
baf3760b7900f3706171ca861604b37741884332006f4ebfe58c35f286f26a11N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
baf3760b7900f3706171ca861604b37741884332006f4ebfe58c35f286f26a11N.exe
-
Size
65KB
-
MD5
0b44981d112d9a6ea2c1f1088d8e4450
-
SHA1
82b1d2ccc214778c757c5bd95a145ffb5fa84bc1
-
SHA256
baf3760b7900f3706171ca861604b37741884332006f4ebfe58c35f286f26a11
-
SHA512
70d8196c56dadd0a02429cb620591d0d5899dd12c89d45420e28ca2db8876918426025000af518f98c6464e552475c9b5bbae75370d12879b66d1b52976acde6
-
SSDEEP
768:penS2pkYLFkMKkQDwFIDx8XjotsqLUgecNGPHDzceLbdTkSLTo/3VuRN42UlTcb:pISA3LFkMJT8LLUMYP3LbCSLcC4b2b
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5