General
-
Target
c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56N.exe
-
Size
1.2MB
-
Sample
241231-xzkhwavmbv
-
MD5
5197fcce49518e796e3ed4becccddd00
-
SHA1
9a0952509dc1645449e7ed3e69d47313d5b4ed5f
-
SHA256
c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56
-
SHA512
a8cca761706c9daec526955e8f752c68d825021cdf185d421f23d7bf53ffadaff42544819eb63ecb4450f858ca7a0e020a8e2974c2c2220e108585fbf4473a42
-
SSDEEP
24576:GII2mRVMuLi/mDnICLJ4gxqBeC7/ATDNoo3cK0Ef2gsODWdR:JmRV247qBeC7/ATDNo2+Ef2gsODcR
Static task
static1
Behavioral task
behavioral1
Sample
c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56N.exe
-
Size
1.2MB
-
MD5
5197fcce49518e796e3ed4becccddd00
-
SHA1
9a0952509dc1645449e7ed3e69d47313d5b4ed5f
-
SHA256
c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56
-
SHA512
a8cca761706c9daec526955e8f752c68d825021cdf185d421f23d7bf53ffadaff42544819eb63ecb4450f858ca7a0e020a8e2974c2c2220e108585fbf4473a42
-
SSDEEP
24576:GII2mRVMuLi/mDnICLJ4gxqBeC7/ATDNoo3cK0Ef2gsODWdR:JmRV247qBeC7/ATDNo2+Ef2gsODcR
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5