General
-
Target
4c1b6046c4b1cededd3d98d308f5c6b5839bead4aba3a072693f2b9877f0cd8b
-
Size
97KB
-
Sample
241223-z4qlss1pfx
-
MD5
4de6ba967c025382ab5613af7edaab3a
-
SHA1
499f48f4b90033190a8bdca91ce0b91af46ebfb3
-
SHA256
4c1b6046c4b1cededd3d98d308f5c6b5839bead4aba3a072693f2b9877f0cd8b
-
SHA512
86a15a0231c5ecdaad270bd0133f3ed3b33dbbad95ae1ca2aa08a8f7cd4ec8187ae82d5ff08638b1852f42b60a882733d109a0156c89aa4d85af8acd7d7d78cb
-
SSDEEP
3072:G47uciAVhHLdS3HfGXdlZhZQZbfRq+koXCMDV:N7BHLdCcdlZhH+hXLh
Static task
static1
Behavioral task
behavioral1
Sample
4c1b6046c4b1cededd3d98d308f5c6b5839bead4aba3a072693f2b9877f0cd8b.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4c1b6046c4b1cededd3d98d308f5c6b5839bead4aba3a072693f2b9877f0cd8b
-
Size
97KB
-
MD5
4de6ba967c025382ab5613af7edaab3a
-
SHA1
499f48f4b90033190a8bdca91ce0b91af46ebfb3
-
SHA256
4c1b6046c4b1cededd3d98d308f5c6b5839bead4aba3a072693f2b9877f0cd8b
-
SHA512
86a15a0231c5ecdaad270bd0133f3ed3b33dbbad95ae1ca2aa08a8f7cd4ec8187ae82d5ff08638b1852f42b60a882733d109a0156c89aa4d85af8acd7d7d78cb
-
SSDEEP
3072:G47uciAVhHLdS3HfGXdlZhZQZbfRq+koXCMDV:N7BHLdCcdlZhH+hXLh
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5