General
-
Target
6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d
-
Size
65KB
-
Sample
241229-a1r8saxkdp
-
MD5
6d520041f77829c0a6354fe06a1f8164
-
SHA1
c11f628908ff531ecc572ec377f7385c8c0fdb97
-
SHA256
6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d
-
SHA512
906fd843b120d2a001d626e4cdaa94ea5fc40fe3609d3ef8c70f88341efdc8fda244c3ec20e6b14755b70d45791692951c7cc3983bdcc854b847f93c5a83580e
-
SSDEEP
1536:p8Jg+MKYdahghTLDJ/jGfiL2C9485D0MkZ9ZteEwFxs:p8J/MmgRDJ/SaLd5DY9Te/2
Static task
static1
Behavioral task
behavioral1
Sample
6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d
-
Size
65KB
-
MD5
6d520041f77829c0a6354fe06a1f8164
-
SHA1
c11f628908ff531ecc572ec377f7385c8c0fdb97
-
SHA256
6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d
-
SHA512
906fd843b120d2a001d626e4cdaa94ea5fc40fe3609d3ef8c70f88341efdc8fda244c3ec20e6b14755b70d45791692951c7cc3983bdcc854b847f93c5a83580e
-
SSDEEP
1536:p8Jg+MKYdahghTLDJ/jGfiL2C9485D0MkZ9ZteEwFxs:p8J/MmgRDJ/SaLd5DY9Te/2
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5