General
-
Target
9b4da148fc7619c16eede5c584107d0685e10721d31fd46b7f937283f531b8f8
-
Size
65KB
-
Sample
241225-bbhhqasnaw
-
MD5
624d9c251480c776b9cae1dfb939cb7f
-
SHA1
f6a6b56765aa150399180bae4effbf3fd057f7a9
-
SHA256
9b4da148fc7619c16eede5c584107d0685e10721d31fd46b7f937283f531b8f8
-
SHA512
0eb7db2ac98d0be3cc66cfbac415dc02ec24497d318bc9291b5e49be20500bd1403f714e81f62e069bddb6fa466a5e0a8899b335f2bfc9d220e582240d6e608c
-
SSDEEP
1536:NqoC7Bt1M4jelHcQ+wsOir8kJBWcRo1LpAWUn9jPpQqWDsDn+:WD1il8QKr8kJYTLEPkDs6
Static task
static1
Behavioral task
behavioral1
Sample
9b4da148fc7619c16eede5c584107d0685e10721d31fd46b7f937283f531b8f8.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9b4da148fc7619c16eede5c584107d0685e10721d31fd46b7f937283f531b8f8
-
Size
65KB
-
MD5
624d9c251480c776b9cae1dfb939cb7f
-
SHA1
f6a6b56765aa150399180bae4effbf3fd057f7a9
-
SHA256
9b4da148fc7619c16eede5c584107d0685e10721d31fd46b7f937283f531b8f8
-
SHA512
0eb7db2ac98d0be3cc66cfbac415dc02ec24497d318bc9291b5e49be20500bd1403f714e81f62e069bddb6fa466a5e0a8899b335f2bfc9d220e582240d6e608c
-
SSDEEP
1536:NqoC7Bt1M4jelHcQ+wsOir8kJBWcRo1LpAWUn9jPpQqWDsDn+:WD1il8QKr8kJYTLEPkDs6
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5