General
-
Target
e5e4d267c9c870e132178de08e8a179c97b5b8245d129fa8372287c5176e0ce4N.exe
-
Size
270KB
-
Sample
241230-x3szesvlel
-
MD5
2325c728136f3f0f4b9edacc66a2ffc0
-
SHA1
e6bf1435e75593aea7f56d9a2a58b0230572783a
-
SHA256
e5e4d267c9c870e132178de08e8a179c97b5b8245d129fa8372287c5176e0ce4
-
SHA512
1a4d9c9910750e565685a4bedd121ff834f8a7c2c3b83f1603b4c4a230fb97e0ef126f24237572189a80d4e8953f0487a19d96bcf65ea360014b62db0fb33c3e
-
SSDEEP
1536:gBwm02zOoxn/2fYsnpJRaCAd1uhNRXpXMOrqXSF63tokrqSDuiLwZUEzIiSeloIe:gGzoxnEYsnRp8Orq26ekdDuWwwglD4
Static task
static1
Behavioral task
behavioral1
Sample
e5e4d267c9c870e132178de08e8a179c97b5b8245d129fa8372287c5176e0ce4N.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e5e4d267c9c870e132178de08e8a179c97b5b8245d129fa8372287c5176e0ce4N.exe
-
Size
270KB
-
MD5
2325c728136f3f0f4b9edacc66a2ffc0
-
SHA1
e6bf1435e75593aea7f56d9a2a58b0230572783a
-
SHA256
e5e4d267c9c870e132178de08e8a179c97b5b8245d129fa8372287c5176e0ce4
-
SHA512
1a4d9c9910750e565685a4bedd121ff834f8a7c2c3b83f1603b4c4a230fb97e0ef126f24237572189a80d4e8953f0487a19d96bcf65ea360014b62db0fb33c3e
-
SSDEEP
1536:gBwm02zOoxn/2fYsnpJRaCAd1uhNRXpXMOrqXSF63tokrqSDuiLwZUEzIiSeloIe:gGzoxnEYsnRp8Orq26ekdDuWwwglD4
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5