General
-
Target
4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3
-
Size
3.5MB
-
Sample
241227-s6sevaxjbq
-
MD5
ed89a1c31aec51d2f9469020a030cf9d
-
SHA1
be0bd2ff44b9a4c1731621947ddb1a5c4297dbc7
-
SHA256
4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3
-
SHA512
9f83707c4d6a30f9355ca439da4c38f4c9501f3e0a7e3f6a4df535a15bd5151cc9847ed76f3e0133d185ccfdcbeac02e92c6f64ba473117928e3bb348c557f08
-
SSDEEP
49152:xYI2/kVFVFCzKgP+s8KuqGaX0ToIBAUZLYbWy0Af1F9:t2kVbcWgkJBAUZLDA1
Static task
static1
Behavioral task
behavioral1
Sample
4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3
-
Size
3.5MB
-
MD5
ed89a1c31aec51d2f9469020a030cf9d
-
SHA1
be0bd2ff44b9a4c1731621947ddb1a5c4297dbc7
-
SHA256
4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3
-
SHA512
9f83707c4d6a30f9355ca439da4c38f4c9501f3e0a7e3f6a4df535a15bd5151cc9847ed76f3e0133d185ccfdcbeac02e92c6f64ba473117928e3bb348c557f08
-
SSDEEP
49152:xYI2/kVFVFCzKgP+s8KuqGaX0ToIBAUZLYbWy0Af1F9:t2kVbcWgkJBAUZLDA1
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5