General
-
Target
90ae6358bebf492d6743130f4514c0b31650c5d0331ec70c57a7cab7b8a8198c.exe
-
Size
97KB
-
Sample
241226-19jwwatjek
-
MD5
7f7edfaa1793db1507934ec68620c2a4
-
SHA1
03a3b59b48b9ea0e8497acd083259313aedbb417
-
SHA256
90ae6358bebf492d6743130f4514c0b31650c5d0331ec70c57a7cab7b8a8198c
-
SHA512
2f063ca301ae89117e76b42bc18633c17fabf35aaba1d1f3473bfc6aa7360d2f7bb8c7f0a8e12c8c299259299839ecf7bd6f7ac7e83bffe36da44b0b01bfd002
-
SSDEEP
1536:WkLq+rjfMJv61tsMuC0XHyXlM8H3CPVMNwkT0ofirnmf+N9VUoFaDr1c:tLJrjfM01tsMuC0X+6MyIvT079VKry
Static task
static1
Behavioral task
behavioral1
Sample
90ae6358bebf492d6743130f4514c0b31650c5d0331ec70c57a7cab7b8a8198c.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
90ae6358bebf492d6743130f4514c0b31650c5d0331ec70c57a7cab7b8a8198c.exe
-
Size
97KB
-
MD5
7f7edfaa1793db1507934ec68620c2a4
-
SHA1
03a3b59b48b9ea0e8497acd083259313aedbb417
-
SHA256
90ae6358bebf492d6743130f4514c0b31650c5d0331ec70c57a7cab7b8a8198c
-
SHA512
2f063ca301ae89117e76b42bc18633c17fabf35aaba1d1f3473bfc6aa7360d2f7bb8c7f0a8e12c8c299259299839ecf7bd6f7ac7e83bffe36da44b0b01bfd002
-
SSDEEP
1536:WkLq+rjfMJv61tsMuC0XHyXlM8H3CPVMNwkT0ofirnmf+N9VUoFaDr1c:tLJrjfM01tsMuC0X+6MyIvT079VKry
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5