General
-
Target
1a0bc482625135fc2acae39e5368e118634304664ff205bccd49f1d926346e49N.exe
-
Size
65KB
-
Sample
241226-hb8hgayqcl
-
MD5
f5e03cdb17fcc5e989ec0fa882ca3560
-
SHA1
0a429e9a4781c2290b9356dd46a5862b6b7d9ef8
-
SHA256
1a0bc482625135fc2acae39e5368e118634304664ff205bccd49f1d926346e49
-
SHA512
0400d9f5b9f683d399fd687804a89c8306114da7f3fcedf30028563972c1121840ef257b8aedf3aef65df8c416a5a95bbed7d1dd08dbb248da4f0e6c8aaf9fec
-
SSDEEP
1536:Nd06ZkX/yLALLlUHuk2ZdfYEieZGZzEi4QQlJx1zVf0WlP4NCd:k6ZkX/yLALxnk2ZxihEi4Qw5fX4y
Static task
static1
Behavioral task
behavioral1
Sample
1a0bc482625135fc2acae39e5368e118634304664ff205bccd49f1d926346e49N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1a0bc482625135fc2acae39e5368e118634304664ff205bccd49f1d926346e49N.exe
-
Size
65KB
-
MD5
f5e03cdb17fcc5e989ec0fa882ca3560
-
SHA1
0a429e9a4781c2290b9356dd46a5862b6b7d9ef8
-
SHA256
1a0bc482625135fc2acae39e5368e118634304664ff205bccd49f1d926346e49
-
SHA512
0400d9f5b9f683d399fd687804a89c8306114da7f3fcedf30028563972c1121840ef257b8aedf3aef65df8c416a5a95bbed7d1dd08dbb248da4f0e6c8aaf9fec
-
SSDEEP
1536:Nd06ZkX/yLALLlUHuk2ZdfYEieZGZzEi4QQlJx1zVf0WlP4NCd:k6ZkX/yLALxnk2ZxihEi4Qw5fX4y
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5