General
-
Target
27d166ec7075023ae9db7bcd2886e3c9b2418c3189ca79803d54fa2eb21eec30.exe
-
Size
65KB
-
Sample
241226-sp74zaylfy
-
MD5
80f1667eb4b12cceaaef81d534763c5f
-
SHA1
bf5e21ea6ef4abc3ff07b8a5ad0765d5f4fcc65e
-
SHA256
27d166ec7075023ae9db7bcd2886e3c9b2418c3189ca79803d54fa2eb21eec30
-
SHA512
67f94d3aedde0e73d523c9955e960c7a94f3c635982d1182dae04189613875dad8c1bdb4fa32d3ec93581c773a79625b69af158b5fe61521bb67e0a365b0bb73
-
SSDEEP
1536:jqT/obsagBUnpagDBczwpA7k1zJDhVJ3omtDa9wqRhC3kW:jqT/obrgYa+BpLjVYGDa9wqRhUkW
Static task
static1
Behavioral task
behavioral1
Sample
27d166ec7075023ae9db7bcd2886e3c9b2418c3189ca79803d54fa2eb21eec30.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
27d166ec7075023ae9db7bcd2886e3c9b2418c3189ca79803d54fa2eb21eec30.exe
-
Size
65KB
-
MD5
80f1667eb4b12cceaaef81d534763c5f
-
SHA1
bf5e21ea6ef4abc3ff07b8a5ad0765d5f4fcc65e
-
SHA256
27d166ec7075023ae9db7bcd2886e3c9b2418c3189ca79803d54fa2eb21eec30
-
SHA512
67f94d3aedde0e73d523c9955e960c7a94f3c635982d1182dae04189613875dad8c1bdb4fa32d3ec93581c773a79625b69af158b5fe61521bb67e0a365b0bb73
-
SSDEEP
1536:jqT/obsagBUnpagDBczwpA7k1zJDhVJ3omtDa9wqRhC3kW:jqT/obrgYa+BpLjVYGDa9wqRhUkW
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5