General
-
Target
ec9547fd25b919e13b4cf8ca1e1efddb928474f9c268ade1fc499ba464818db7.exe
-
Size
472KB
-
Sample
241231-yrwrlsyqfm
-
MD5
7e9d458b4aed8aa40440414ec8dfc836
-
SHA1
6a2a7a95c4be7dc204e34cddbdac37ad335a1540
-
SHA256
ec9547fd25b919e13b4cf8ca1e1efddb928474f9c268ade1fc499ba464818db7
-
SHA512
8fc9ef59f0edbd8647ffb98b9b1064f628b3a0a34022706dd6d19adccd95fa00e4c69860d9e0e7f053fbf64d2e2fe4becf5ae19251a3103177595bc0417163b2
-
SSDEEP
12288:Zr/DQBliWQapuDkmYlmD43FWKKykIQ54vmOfOxtLSv:ZjDQF5pcimCFWKFlvmoOxtOv
Static task
static1
Behavioral task
behavioral1
Sample
ec9547fd25b919e13b4cf8ca1e1efddb928474f9c268ade1fc499ba464818db7.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ec9547fd25b919e13b4cf8ca1e1efddb928474f9c268ade1fc499ba464818db7.exe
-
Size
472KB
-
MD5
7e9d458b4aed8aa40440414ec8dfc836
-
SHA1
6a2a7a95c4be7dc204e34cddbdac37ad335a1540
-
SHA256
ec9547fd25b919e13b4cf8ca1e1efddb928474f9c268ade1fc499ba464818db7
-
SHA512
8fc9ef59f0edbd8647ffb98b9b1064f628b3a0a34022706dd6d19adccd95fa00e4c69860d9e0e7f053fbf64d2e2fe4becf5ae19251a3103177595bc0417163b2
-
SSDEEP
12288:Zr/DQBliWQapuDkmYlmD43FWKKykIQ54vmOfOxtLSv:ZjDQF5pcimCFWKFlvmoOxtOv
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5