General
-
Target
af1bdb3ea1da5782851677d7877b650567e5fef24cbca16d2afdfd723f727eff
-
Size
2.7MB
-
Sample
241229-r6ctqatpbq
-
MD5
5c6925eb32aba621901d1d71e2d9302f
-
SHA1
88e338b5c55b0c7b0a3919d0a027e7e1141d0036
-
SHA256
af1bdb3ea1da5782851677d7877b650567e5fef24cbca16d2afdfd723f727eff
-
SHA512
b445db41e9f55b5a290c233966fcc1f1aeba6a7edbac56c05edbf50ddbb3fc4c4745f5ea9d6a1057e1eeadfd97cdafbec02b248b6a9b66196211e38921906e11
-
SSDEEP
49152:cfhripvIOVc6pan0Vh1STGEaPKTtqi82p9O0DxI2:cRidTc6p00Vh1SVei82z
Static task
static1
Behavioral task
behavioral1
Sample
af1bdb3ea1da5782851677d7877b650567e5fef24cbca16d2afdfd723f727eff.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
af1bdb3ea1da5782851677d7877b650567e5fef24cbca16d2afdfd723f727eff
-
Size
2.7MB
-
MD5
5c6925eb32aba621901d1d71e2d9302f
-
SHA1
88e338b5c55b0c7b0a3919d0a027e7e1141d0036
-
SHA256
af1bdb3ea1da5782851677d7877b650567e5fef24cbca16d2afdfd723f727eff
-
SHA512
b445db41e9f55b5a290c233966fcc1f1aeba6a7edbac56c05edbf50ddbb3fc4c4745f5ea9d6a1057e1eeadfd97cdafbec02b248b6a9b66196211e38921906e11
-
SSDEEP
49152:cfhripvIOVc6pan0Vh1STGEaPKTtqi82p9O0DxI2:cRidTc6p00Vh1SVei82z
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5