General
-
Target
d091a892b0e1f757e8ef4d0c8367525ec118a4fdabe837b9006961faca90f7b6
-
Size
738KB
-
Sample
241224-ylhb2avrfv
-
MD5
b7663ed53c0966c13421f71a7132bc50
-
SHA1
8c95a2fb52deb4a4b0e19029e377469f0b6aa2bc
-
SHA256
d091a892b0e1f757e8ef4d0c8367525ec118a4fdabe837b9006961faca90f7b6
-
SHA512
17bc4d589addab68cbec5bec3cf90eb85800ff4bbbb44c4a82170d7dd0093e8b3d179d284f06b5247383470ae49704a9fea65bea455fd466563e8ba828c08aed
-
SSDEEP
12288:h/Jm0On2dUX/jtKQPdUS1Dyex0wO2bEBWqsn0ak4Vf8N4XfMIiElTFDrhc/fr6Lv:1E2UX/jFOsn0xlilJ3u/cASJSfM7zjPV
Static task
static1
Behavioral task
behavioral1
Sample
d091a892b0e1f757e8ef4d0c8367525ec118a4fdabe837b9006961faca90f7b6.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d091a892b0e1f757e8ef4d0c8367525ec118a4fdabe837b9006961faca90f7b6
-
Size
738KB
-
MD5
b7663ed53c0966c13421f71a7132bc50
-
SHA1
8c95a2fb52deb4a4b0e19029e377469f0b6aa2bc
-
SHA256
d091a892b0e1f757e8ef4d0c8367525ec118a4fdabe837b9006961faca90f7b6
-
SHA512
17bc4d589addab68cbec5bec3cf90eb85800ff4bbbb44c4a82170d7dd0093e8b3d179d284f06b5247383470ae49704a9fea65bea455fd466563e8ba828c08aed
-
SSDEEP
12288:h/Jm0On2dUX/jtKQPdUS1Dyex0wO2bEBWqsn0ak4Vf8N4XfMIiElTFDrhc/fr6Lv:1E2UX/jFOsn0xlilJ3u/cASJSfM7zjPV
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5