General
-
Target
6bb67ea88a6a95108eecb63a0dd7d0cabc8ed13aa189d75b5364b7acc66ea154N.exe
-
Size
97KB
-
Sample
241226-zqvzcszlct
-
MD5
b36438187fc528120fc71537b0ad1750
-
SHA1
3826cf60f34137912fa49dea7137fbd16df72491
-
SHA256
6bb67ea88a6a95108eecb63a0dd7d0cabc8ed13aa189d75b5364b7acc66ea154
-
SHA512
d044326adbf3dba5c976547491b1772c8ead7d9efa302df9426c09f78e4dbb996cbd42a8060274d37f8d6dce744787bcf761a1c1b8e5fb1c769c36e21fbc5f14
-
SSDEEP
3072:Pk2i5hMilJ1dr6obn+vKAGbqKlfG/3cXq:PBi5GO2obxAGOg03
Static task
static1
Behavioral task
behavioral1
Sample
6bb67ea88a6a95108eecb63a0dd7d0cabc8ed13aa189d75b5364b7acc66ea154N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6bb67ea88a6a95108eecb63a0dd7d0cabc8ed13aa189d75b5364b7acc66ea154N.exe
-
Size
97KB
-
MD5
b36438187fc528120fc71537b0ad1750
-
SHA1
3826cf60f34137912fa49dea7137fbd16df72491
-
SHA256
6bb67ea88a6a95108eecb63a0dd7d0cabc8ed13aa189d75b5364b7acc66ea154
-
SHA512
d044326adbf3dba5c976547491b1772c8ead7d9efa302df9426c09f78e4dbb996cbd42a8060274d37f8d6dce744787bcf761a1c1b8e5fb1c769c36e21fbc5f14
-
SSDEEP
3072:Pk2i5hMilJ1dr6obn+vKAGbqKlfG/3cXq:PBi5GO2obxAGOg03
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5