General
-
Target
f24b019f9f12ac5fabee3f5919e85553a689b4b4af8874db67fce07dc304f267.exe
-
Size
65KB
-
Sample
241226-xrmchavrer
-
MD5
2667e1d7328dedfca8bce67cd733db70
-
SHA1
d36cfc511088b04f8cb48e2ce6b38773ce0ba1fd
-
SHA256
f24b019f9f12ac5fabee3f5919e85553a689b4b4af8874db67fce07dc304f267
-
SHA512
3b51928ca729e9da16bff8ce62d6fece14e976bdebe2992144d4d0ca4b0e5c5ddcde7b8b9196f9c1f63a8995a5a6164f9230fd5e21d5e27947d9605166a2e8d2
-
SSDEEP
1536:Nd06ZkX/yLALLlUHuk2ZdfYEieZGZzEi4QQlJx1zVf0WlP4NCl:k6ZkX/yLALxnk2ZxihEi4Qw5fX4C
Static task
static1
Behavioral task
behavioral1
Sample
f24b019f9f12ac5fabee3f5919e85553a689b4b4af8874db67fce07dc304f267.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f24b019f9f12ac5fabee3f5919e85553a689b4b4af8874db67fce07dc304f267.exe
-
Size
65KB
-
MD5
2667e1d7328dedfca8bce67cd733db70
-
SHA1
d36cfc511088b04f8cb48e2ce6b38773ce0ba1fd
-
SHA256
f24b019f9f12ac5fabee3f5919e85553a689b4b4af8874db67fce07dc304f267
-
SHA512
3b51928ca729e9da16bff8ce62d6fece14e976bdebe2992144d4d0ca4b0e5c5ddcde7b8b9196f9c1f63a8995a5a6164f9230fd5e21d5e27947d9605166a2e8d2
-
SSDEEP
1536:Nd06ZkX/yLALLlUHuk2ZdfYEieZGZzEi4QQlJx1zVf0WlP4NCl:k6ZkX/yLALxnk2ZxihEi4Qw5fX4C
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5