General
-
Target
8fe62b5aa221fb6dc9c75ce17226f8397e9e6834dfe188c353f2c3eb01f16187
-
Size
945KB
-
Sample
241229-b7wefsymdl
-
MD5
30846472b2e0b131869e066de6d065ee
-
SHA1
2c6473d66326fdb0b70d305229410d731a4dc57b
-
SHA256
8fe62b5aa221fb6dc9c75ce17226f8397e9e6834dfe188c353f2c3eb01f16187
-
SHA512
6621483ea840bce01867e8932594ff4890844639a6f7c1c258e95274298b90faa0f1b156978405d08567bd23c5cbc121c6e8e9a6bc8e20f2e56683478064cc4f
-
SSDEEP
24576:UvoTKUsEyEyK+LS3g9KXqKtu73aB0vlnD:UvouUPk9evtu7KqdD
Static task
static1
Behavioral task
behavioral1
Sample
8fe62b5aa221fb6dc9c75ce17226f8397e9e6834dfe188c353f2c3eb01f16187.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8fe62b5aa221fb6dc9c75ce17226f8397e9e6834dfe188c353f2c3eb01f16187
-
Size
945KB
-
MD5
30846472b2e0b131869e066de6d065ee
-
SHA1
2c6473d66326fdb0b70d305229410d731a4dc57b
-
SHA256
8fe62b5aa221fb6dc9c75ce17226f8397e9e6834dfe188c353f2c3eb01f16187
-
SHA512
6621483ea840bce01867e8932594ff4890844639a6f7c1c258e95274298b90faa0f1b156978405d08567bd23c5cbc121c6e8e9a6bc8e20f2e56683478064cc4f
-
SSDEEP
24576:UvoTKUsEyEyK+LS3g9KXqKtu73aB0vlnD:UvouUPk9evtu7KqdD
-
Modifies firewall policy service
-
Sality family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5