General
-
Target
dfe4ff95af3f3ae08da5fe705fd6886fa4a344947e35b634ae4e37565d277857.exe
-
Size
65KB
-
Sample
241222-my4v1swjgj
-
MD5
5979fad253eaa4107b03a57b6e75dc46
-
SHA1
c35b8b272ea64dfcdfd8864e54512c87f0bd2b93
-
SHA256
dfe4ff95af3f3ae08da5fe705fd6886fa4a344947e35b634ae4e37565d277857
-
SHA512
ddedc6757543dc61e400a2ef8c71e6a750af5beb42375b5ddd37c78feecc597abf13e2d1174b95f1eeb0cd7bf70f3e38d0b270886901c4794bf35d2fb78927f2
-
SSDEEP
1536:zcy6O0sX+zjUs0EUDkeGUzJTqri+gAggPe8v6p3WX/8w3lsLH+jRqVS:h6xzz0tB5zsuXdgPeJVWX/ZjUVS
Static task
static1
Behavioral task
behavioral1
Sample
dfe4ff95af3f3ae08da5fe705fd6886fa4a344947e35b634ae4e37565d277857.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
dfe4ff95af3f3ae08da5fe705fd6886fa4a344947e35b634ae4e37565d277857.exe
-
Size
65KB
-
MD5
5979fad253eaa4107b03a57b6e75dc46
-
SHA1
c35b8b272ea64dfcdfd8864e54512c87f0bd2b93
-
SHA256
dfe4ff95af3f3ae08da5fe705fd6886fa4a344947e35b634ae4e37565d277857
-
SHA512
ddedc6757543dc61e400a2ef8c71e6a750af5beb42375b5ddd37c78feecc597abf13e2d1174b95f1eeb0cd7bf70f3e38d0b270886901c4794bf35d2fb78927f2
-
SSDEEP
1536:zcy6O0sX+zjUs0EUDkeGUzJTqri+gAggPe8v6p3WX/8w3lsLH+jRqVS:h6xzz0tB5zsuXdgPeJVWX/ZjUVS
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5