General
-
Target
8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9N.exe
-
Size
65KB
-
Sample
241226-z1bcpszqhk
-
MD5
b014d5663129d617cc5a40a44a3e4500
-
SHA1
3c5b6340499df50fc204b94f4793e8181959d135
-
SHA256
8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9
-
SHA512
0cecf1d5187478c9463a37b8b40941e2fdc41e88f99386cd877aefa7cf1ee4a7c5e19cb61c552c711945370fd1f165c45202b94600c48cef942529ec3aa01281
-
SSDEEP
1536:sBZsfDfTl0RfnqWXgj7THUIeuDFtOdNFO6oETfAJ+cbL:8ZsTY/qyyPHsytqO6P0kcbL
Static task
static1
Behavioral task
behavioral1
Sample
8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9N.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9N.exe
-
Size
65KB
-
MD5
b014d5663129d617cc5a40a44a3e4500
-
SHA1
3c5b6340499df50fc204b94f4793e8181959d135
-
SHA256
8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9
-
SHA512
0cecf1d5187478c9463a37b8b40941e2fdc41e88f99386cd877aefa7cf1ee4a7c5e19cb61c552c711945370fd1f165c45202b94600c48cef942529ec3aa01281
-
SSDEEP
1536:sBZsfDfTl0RfnqWXgj7THUIeuDFtOdNFO6oETfAJ+cbL:8ZsTY/qyyPHsytqO6P0kcbL
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5