General
-
Target
fbe50dfdd5e0879493474434bd71a93b23158b80898a7551913e1c7911b2de6cN.exe
-
Size
97KB
-
Sample
241226-yfg43swqez
-
MD5
6e423ddf855b2ba0c5e9acf1fce02080
-
SHA1
e1e4f699123102959fdeacb4fefbf71305738ec2
-
SHA256
fbe50dfdd5e0879493474434bd71a93b23158b80898a7551913e1c7911b2de6c
-
SHA512
3ad19a00ae31548a0da3b821061003a153b1b32ed1c07fca457cb4f4338d135337b4135adc92f9c5565a1123eb1ad28ab105caf8dc3a8f7000b6c02cec5ae7af
-
SSDEEP
1536:G8l+o9bzLv1ELxXYbuGBFDOmnrdyoBTTgkrUxpkmynG7vweP64J:NY4bzLyYqGBznr1BhrUxpinqIeP64J
Static task
static1
Behavioral task
behavioral1
Sample
fbe50dfdd5e0879493474434bd71a93b23158b80898a7551913e1c7911b2de6cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fbe50dfdd5e0879493474434bd71a93b23158b80898a7551913e1c7911b2de6cN.exe
-
Size
97KB
-
MD5
6e423ddf855b2ba0c5e9acf1fce02080
-
SHA1
e1e4f699123102959fdeacb4fefbf71305738ec2
-
SHA256
fbe50dfdd5e0879493474434bd71a93b23158b80898a7551913e1c7911b2de6c
-
SHA512
3ad19a00ae31548a0da3b821061003a153b1b32ed1c07fca457cb4f4338d135337b4135adc92f9c5565a1123eb1ad28ab105caf8dc3a8f7000b6c02cec5ae7af
-
SSDEEP
1536:G8l+o9bzLv1ELxXYbuGBFDOmnrdyoBTTgkrUxpkmynG7vweP64J:NY4bzLyYqGBznr1BhrUxpinqIeP64J
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5