General
-
Target
a3d625aea5723998f77c5644b8dd3e27083f000d13393c9f07b71b440bfa3827
-
Size
1.1MB
-
Sample
241224-s6rtba1kb1
-
MD5
d8a89d401087ea7ea06e1a56b6ab6223
-
SHA1
6afd8e992ddceba1939fa3001f18d0e4764341ee
-
SHA256
a3d625aea5723998f77c5644b8dd3e27083f000d13393c9f07b71b440bfa3827
-
SHA512
3555910fce47fe5c2ef93229d456f2dc035acfad7606de36b0a93f26c9a51d2acd62bbce56fff1f90d7b3ad52cc6ad4834742f2f04e43c26b212dbbb1f63b665
-
SSDEEP
24576:hBDyyXybefJWjY/dG1fdeqpUA73z+6W99WnDfJEkRV8KWPPfSsA/gjt:hBDFXcg8E/YzxTz+XIL9RGKQPeY5
Behavioral task
behavioral1
Sample
a3d625aea5723998f77c5644b8dd3e27083f000d13393c9f07b71b440bfa3827.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a3d625aea5723998f77c5644b8dd3e27083f000d13393c9f07b71b440bfa3827
-
Size
1.1MB
-
MD5
d8a89d401087ea7ea06e1a56b6ab6223
-
SHA1
6afd8e992ddceba1939fa3001f18d0e4764341ee
-
SHA256
a3d625aea5723998f77c5644b8dd3e27083f000d13393c9f07b71b440bfa3827
-
SHA512
3555910fce47fe5c2ef93229d456f2dc035acfad7606de36b0a93f26c9a51d2acd62bbce56fff1f90d7b3ad52cc6ad4834742f2f04e43c26b212dbbb1f63b665
-
SSDEEP
24576:hBDyyXybefJWjY/dG1fdeqpUA73z+6W99WnDfJEkRV8KWPPfSsA/gjt:hBDFXcg8E/YzxTz+XIL9RGKQPeY5
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5