General
-
Target
55d21ca877b143c89354a369d903a367910d52424a70ea15eed29974fa4ed51cN.exe
-
Size
65KB
-
Sample
241226-vwer4ssmem
-
MD5
c76592c73b270d21a4958e38a73ff5c0
-
SHA1
f59118b08233443e61218817feaf2c07a41ca741
-
SHA256
55d21ca877b143c89354a369d903a367910d52424a70ea15eed29974fa4ed51c
-
SHA512
17eecd2828f5ea6b418a0b763aa16d55ce63c84a576dd3569e6faae4e104c0d5b0f0ca84ac2c59bff411f7899a82ebdc3b2bcff075403b6c0fb7d8f1145cc6b2
-
SSDEEP
1536:0Gh691Wb4UKME+beTEN//yq7SgHHOHcDkEADDun+A+j:0Gw98b4TMzyuKmu8DkLj
Static task
static1
Behavioral task
behavioral1
Sample
55d21ca877b143c89354a369d903a367910d52424a70ea15eed29974fa4ed51cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
55d21ca877b143c89354a369d903a367910d52424a70ea15eed29974fa4ed51cN.exe
-
Size
65KB
-
MD5
c76592c73b270d21a4958e38a73ff5c0
-
SHA1
f59118b08233443e61218817feaf2c07a41ca741
-
SHA256
55d21ca877b143c89354a369d903a367910d52424a70ea15eed29974fa4ed51c
-
SHA512
17eecd2828f5ea6b418a0b763aa16d55ce63c84a576dd3569e6faae4e104c0d5b0f0ca84ac2c59bff411f7899a82ebdc3b2bcff075403b6c0fb7d8f1145cc6b2
-
SSDEEP
1536:0Gh691Wb4UKME+beTEN//yq7SgHHOHcDkEADDun+A+j:0Gw98b4TMzyuKmu8DkLj
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5