General
-
Target
bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbdN.exe
-
Size
384KB
-
Sample
241231-bb1z3awpbq
-
MD5
49dfb5e4b33c5ee80886f6fe610769f0
-
SHA1
3dcc2e45fca701dd141ae58bb8916704cbfc0439
-
SHA256
bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbd
-
SHA512
3a4a9b1b0c1be1e3ee9b2cc3e767223a2cd57a3a3d0ccef39f6f246d5fdd16bcc3eb9df63310137f9a53d5ce1069f9e8872bd4c6aa9a890c19684c45ac54a735
-
SSDEEP
12288:h20VlhganzrWSG6zCWC5kcDeltmxasBorLSJiI/Tm+rm:llzriWWDeuxaprLSnTo
Static task
static1
Behavioral task
behavioral1
Sample
bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbdN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbdN.exe
-
Size
384KB
-
MD5
49dfb5e4b33c5ee80886f6fe610769f0
-
SHA1
3dcc2e45fca701dd141ae58bb8916704cbfc0439
-
SHA256
bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbd
-
SHA512
3a4a9b1b0c1be1e3ee9b2cc3e767223a2cd57a3a3d0ccef39f6f246d5fdd16bcc3eb9df63310137f9a53d5ce1069f9e8872bd4c6aa9a890c19684c45ac54a735
-
SSDEEP
12288:h20VlhganzrWSG6zCWC5kcDeltmxasBorLSJiI/Tm+rm:llzriWWDeuxaprLSnTo
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5