General
-
Target
10da3d685ae3e80d01fda8e0b76ee8c8b8c8960502c141ac001809a32ab07e2dN.exe
-
Size
1.1MB
-
Sample
241231-j9bf3atpgr
-
MD5
0c31299aff7b286df54ae49c88bad870
-
SHA1
5ec853ddbaf6823367bbab6c08b0b895fcf618fe
-
SHA256
10da3d685ae3e80d01fda8e0b76ee8c8b8c8960502c141ac001809a32ab07e2d
-
SHA512
d1a99bc0b73c14f8336b3175c52cca2a35f72ce648de0fb9b2d87160cb6b0390514257b0594ef255844e76535abb36cbb40ed0c0f57d55720a11c25ddeb45a2d
-
SSDEEP
1536:R4u6oqBAwoj05PwlKcx+xxiG7sbMefkuECIwOcTEN2WNUFM/+1fDA:pPqB7j2Ka+xxh7sy4zItU2/uE
Static task
static1
Behavioral task
behavioral1
Sample
10da3d685ae3e80d01fda8e0b76ee8c8b8c8960502c141ac001809a32ab07e2dN.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
10da3d685ae3e80d01fda8e0b76ee8c8b8c8960502c141ac001809a32ab07e2dN.exe
-
Size
1.1MB
-
MD5
0c31299aff7b286df54ae49c88bad870
-
SHA1
5ec853ddbaf6823367bbab6c08b0b895fcf618fe
-
SHA256
10da3d685ae3e80d01fda8e0b76ee8c8b8c8960502c141ac001809a32ab07e2d
-
SHA512
d1a99bc0b73c14f8336b3175c52cca2a35f72ce648de0fb9b2d87160cb6b0390514257b0594ef255844e76535abb36cbb40ed0c0f57d55720a11c25ddeb45a2d
-
SSDEEP
1536:R4u6oqBAwoj05PwlKcx+xxiG7sbMefkuECIwOcTEN2WNUFM/+1fDA:pPqB7j2Ka+xxh7sy4zItU2/uE
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5