General
-
Target
adffa1ec475e501fc750a1c9fc1b1f88bb078448e584d7a210a7bdba7bf13e71N.exe
-
Size
268KB
-
Sample
241231-zplz3a1nal
-
MD5
44f5cf004524ed73b352c31d3a308240
-
SHA1
a0642d03436ec4c10e4fe6859ccd3f17a30d468f
-
SHA256
adffa1ec475e501fc750a1c9fc1b1f88bb078448e584d7a210a7bdba7bf13e71
-
SHA512
c05d4af2a6bbf502b44b9dc9db995750cc22388e1ea96d0ea5347b827854fdebb470237c1f0ee85c52f8abed2b379a40a54712041ced45092f33dee36c38f559
-
SSDEEP
3072:bcNKbwNrNHYCoFOX7Ebnhu0lvT6LJ3h9YB9LJWo5644Ji2acb+jNp35E9ePaABWv:YnNrNHYZOXIbnhuKW5X04JEcb+T35TYv
Static task
static1
Behavioral task
behavioral1
Sample
adffa1ec475e501fc750a1c9fc1b1f88bb078448e584d7a210a7bdba7bf13e71N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
adffa1ec475e501fc750a1c9fc1b1f88bb078448e584d7a210a7bdba7bf13e71N.exe
-
Size
268KB
-
MD5
44f5cf004524ed73b352c31d3a308240
-
SHA1
a0642d03436ec4c10e4fe6859ccd3f17a30d468f
-
SHA256
adffa1ec475e501fc750a1c9fc1b1f88bb078448e584d7a210a7bdba7bf13e71
-
SHA512
c05d4af2a6bbf502b44b9dc9db995750cc22388e1ea96d0ea5347b827854fdebb470237c1f0ee85c52f8abed2b379a40a54712041ced45092f33dee36c38f559
-
SSDEEP
3072:bcNKbwNrNHYCoFOX7Ebnhu0lvT6LJ3h9YB9LJWo5644Ji2acb+jNp35E9ePaABWv:YnNrNHYZOXIbnhuKW5X04JEcb+T35TYv
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5