General
-
Target
95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b.exe
-
Size
65KB
-
Sample
241226-hneqxszjgm
-
MD5
c41eef1c3b4089ea54be3002d00a7f9f
-
SHA1
765ea1a46ea9a64f32e74ab8fbee9b1ced3a2f9b
-
SHA256
95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b
-
SHA512
1a7220b92b0b807cf040cdb9f3205a9e3c602b08276fe85e83357bb939149698af0d30a18264406948cb8d682faadf017e919f8fa2c4968995a692e9805a74ec
-
SSDEEP
1536:sJEPuog/9rUSEODWLINa3+JQqpQSy5vj0CB5+gcs:sJ1ZUCDuINa+W1jv5+i
Static task
static1
Behavioral task
behavioral1
Sample
95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b.exe
-
Size
65KB
-
MD5
c41eef1c3b4089ea54be3002d00a7f9f
-
SHA1
765ea1a46ea9a64f32e74ab8fbee9b1ced3a2f9b
-
SHA256
95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b
-
SHA512
1a7220b92b0b807cf040cdb9f3205a9e3c602b08276fe85e83357bb939149698af0d30a18264406948cb8d682faadf017e919f8fa2c4968995a692e9805a74ec
-
SSDEEP
1536:sJEPuog/9rUSEODWLINa3+JQqpQSy5vj0CB5+gcs:sJ1ZUCDuINa+W1jv5+i
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5