General
-
Target
b3fbb2126bb2e8e8582380505b48f6cd01480ca6185cb636f5eb7ab039b93343
-
Size
2.0MB
-
Sample
241229-dsl9ca1lck
-
MD5
65f18784fdb1382a416061405a89ff85
-
SHA1
a032a9516c66d6fb703224a3c4acf7f4d3d055ab
-
SHA256
b3fbb2126bb2e8e8582380505b48f6cd01480ca6185cb636f5eb7ab039b93343
-
SHA512
ff2c62a1fc8c37f4613d69ff726ebfab3a162f1c261b110d0a406f9437ac598732659d2dc27cebc782a3970f3e20d70cc90cb1fdf410652e1ea7597a9671c242
-
SSDEEP
49152:GGtiFYEbTCwMrtxKCnFnQXBbrtgb/iQvu0UHOaYmW:GiE6ZxvWbrtUTrUHO2W
Static task
static1
Behavioral task
behavioral1
Sample
b3fbb2126bb2e8e8582380505b48f6cd01480ca6185cb636f5eb7ab039b93343.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b3fbb2126bb2e8e8582380505b48f6cd01480ca6185cb636f5eb7ab039b93343
-
Size
2.0MB
-
MD5
65f18784fdb1382a416061405a89ff85
-
SHA1
a032a9516c66d6fb703224a3c4acf7f4d3d055ab
-
SHA256
b3fbb2126bb2e8e8582380505b48f6cd01480ca6185cb636f5eb7ab039b93343
-
SHA512
ff2c62a1fc8c37f4613d69ff726ebfab3a162f1c261b110d0a406f9437ac598732659d2dc27cebc782a3970f3e20d70cc90cb1fdf410652e1ea7597a9671c242
-
SSDEEP
49152:GGtiFYEbTCwMrtxKCnFnQXBbrtgb/iQvu0UHOaYmW:GiE6ZxvWbrtUTrUHO2W
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5