General
-
Target
d308adcb23b727b10ed510a749b223e87b2edc5c84d7a410cf955880be607055N.exe
-
Size
97KB
-
Sample
241226-kf3h5a1ncj
-
MD5
650035d4105d54c5545a0e770098f880
-
SHA1
f2aa985a44bd5893f93c2c147e7b7dbd58cd711d
-
SHA256
d308adcb23b727b10ed510a749b223e87b2edc5c84d7a410cf955880be607055
-
SHA512
4a6e0acdd5e7ead1fa44bab4757b2ae17efedb16d78e0b055bedfe6cf8b71b975a30f4a1b956afd05291f8f963f985ca82f23dea8ba57a4bed34d40996de1525
-
SSDEEP
1536:t3m76x1zev9ZF0tVeWLniQH7GDP7TdsmT1ECXxBMzmxGFSXcGlrO:t2+xlkOLLiGSP7Tdsc1ZxBkBFAcSr
Static task
static1
Behavioral task
behavioral1
Sample
d308adcb23b727b10ed510a749b223e87b2edc5c84d7a410cf955880be607055N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d308adcb23b727b10ed510a749b223e87b2edc5c84d7a410cf955880be607055N.exe
-
Size
97KB
-
MD5
650035d4105d54c5545a0e770098f880
-
SHA1
f2aa985a44bd5893f93c2c147e7b7dbd58cd711d
-
SHA256
d308adcb23b727b10ed510a749b223e87b2edc5c84d7a410cf955880be607055
-
SHA512
4a6e0acdd5e7ead1fa44bab4757b2ae17efedb16d78e0b055bedfe6cf8b71b975a30f4a1b956afd05291f8f963f985ca82f23dea8ba57a4bed34d40996de1525
-
SSDEEP
1536:t3m76x1zev9ZF0tVeWLniQH7GDP7TdsmT1ECXxBMzmxGFSXcGlrO:t2+xlkOLLiGSP7Tdsc1ZxBkBFAcSr
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5