General
-
Target
60cbddd36f118a0985a8547534763a71e042e234544101c226d7e6d9b9200fbcN.exe
-
Size
65KB
-
Sample
241226-mrazcstmbn
-
MD5
8a2a7e9c8c9a2b3caa6ad0cd085edad0
-
SHA1
72fcfb9318580b0bb216bd68bc5e680cc34e6e81
-
SHA256
60cbddd36f118a0985a8547534763a71e042e234544101c226d7e6d9b9200fbc
-
SHA512
610aa8c7b4b4d4446fe7bbbcb7f461bb03ea41ef16ceb07089b3e73eba7d1a906dba639d68f31119019aaff016fa6f6f99e7bbf2e36c362e1f254453dab7767e
-
SSDEEP
1536:OrsWVjSmPGGxYZdFaKZJ0KVtvAVurpg0JhQWw0BXwoj4:BA3PGGxHKgAtkL0JVhwoM
Static task
static1
Behavioral task
behavioral1
Sample
60cbddd36f118a0985a8547534763a71e042e234544101c226d7e6d9b9200fbcN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
60cbddd36f118a0985a8547534763a71e042e234544101c226d7e6d9b9200fbcN.exe
-
Size
65KB
-
MD5
8a2a7e9c8c9a2b3caa6ad0cd085edad0
-
SHA1
72fcfb9318580b0bb216bd68bc5e680cc34e6e81
-
SHA256
60cbddd36f118a0985a8547534763a71e042e234544101c226d7e6d9b9200fbc
-
SHA512
610aa8c7b4b4d4446fe7bbbcb7f461bb03ea41ef16ceb07089b3e73eba7d1a906dba639d68f31119019aaff016fa6f6f99e7bbf2e36c362e1f254453dab7767e
-
SSDEEP
1536:OrsWVjSmPGGxYZdFaKZJ0KVtvAVurpg0JhQWw0BXwoj4:BA3PGGxHKgAtkL0JVhwoM
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5