General
-
Target
6f480692e42acf2a4111f097a7e3469b43bc275c79a10b1cb7d454e185ef4e41N.exe
-
Size
65KB
-
Sample
241226-xgakysvnhp
-
MD5
836b8567ea77d9283ef6d2270c34c2a0
-
SHA1
50e1b27163f61784cc12e8149182f914c8474391
-
SHA256
6f480692e42acf2a4111f097a7e3469b43bc275c79a10b1cb7d454e185ef4e41
-
SHA512
92ab6b2c85621da0959e2d18bef7fe1765cedec93f2f07c16d5b63b149af3cc0f1aaadad8d26d5bce49462486c0073c22f2bc3e52b2ed889039533b59df88f98
-
SSDEEP
1536:C67GyL30fLGMGWRg4P/vaQ7E39VBg4EPM6hVqgyAr/g43:OyQGxGgsJElbEPBhdymYq
Static task
static1
Behavioral task
behavioral1
Sample
6f480692e42acf2a4111f097a7e3469b43bc275c79a10b1cb7d454e185ef4e41N.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6f480692e42acf2a4111f097a7e3469b43bc275c79a10b1cb7d454e185ef4e41N.exe
-
Size
65KB
-
MD5
836b8567ea77d9283ef6d2270c34c2a0
-
SHA1
50e1b27163f61784cc12e8149182f914c8474391
-
SHA256
6f480692e42acf2a4111f097a7e3469b43bc275c79a10b1cb7d454e185ef4e41
-
SHA512
92ab6b2c85621da0959e2d18bef7fe1765cedec93f2f07c16d5b63b149af3cc0f1aaadad8d26d5bce49462486c0073c22f2bc3e52b2ed889039533b59df88f98
-
SSDEEP
1536:C67GyL30fLGMGWRg4P/vaQ7E39VBg4EPM6hVqgyAr/g43:OyQGxGgsJElbEPBhdymYq
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5