General
-
Target
de499ee29c69be763b915e136447dcb703a25648bdb2bd2b1b6b7f5eae551322.exe
-
Size
97KB
-
Sample
241226-v8r8zaspb1
-
MD5
56b961252657155d1b1d54ba26145fab
-
SHA1
c52d730b61ab71afae3274e39ef7517b17a74ae5
-
SHA256
de499ee29c69be763b915e136447dcb703a25648bdb2bd2b1b6b7f5eae551322
-
SHA512
3e4d417c14fac13e7772cec03e0e582b72e68654d314be89ba162bf5b757d7d959b2b28bc3156ee1b843ff6cb9a903a7093bd2f783c2baf39ca60e86c232459b
-
SSDEEP
1536:KUucKQn+yIVjviPU+0d/6upPpWwx5VfoRVtBE4lHIZAcskm+sh4:b9+yI0U+0bpWXLtB60kBo4
Static task
static1
Behavioral task
behavioral1
Sample
de499ee29c69be763b915e136447dcb703a25648bdb2bd2b1b6b7f5eae551322.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
de499ee29c69be763b915e136447dcb703a25648bdb2bd2b1b6b7f5eae551322.exe
-
Size
97KB
-
MD5
56b961252657155d1b1d54ba26145fab
-
SHA1
c52d730b61ab71afae3274e39ef7517b17a74ae5
-
SHA256
de499ee29c69be763b915e136447dcb703a25648bdb2bd2b1b6b7f5eae551322
-
SHA512
3e4d417c14fac13e7772cec03e0e582b72e68654d314be89ba162bf5b757d7d959b2b28bc3156ee1b843ff6cb9a903a7093bd2f783c2baf39ca60e86c232459b
-
SSDEEP
1536:KUucKQn+yIVjviPU+0d/6upPpWwx5VfoRVtBE4lHIZAcskm+sh4:b9+yI0U+0bpWXLtB60kBo4
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5