General
-
Target
6ecd8a0ad689cc8306f6d5de4cac5448ca8a33b2f0f3920f6c2dbc507290ce2a
-
Size
96KB
-
Sample
250126-agla5avmf1
-
MD5
039f86af89df1dc16e2802b00006aef7
-
SHA1
b8278726c0d3722c4fc766df8f7f1312d897869d
-
SHA256
6ecd8a0ad689cc8306f6d5de4cac5448ca8a33b2f0f3920f6c2dbc507290ce2a
-
SHA512
b75954e109644cd9bf0196444a9833e0de4a167ed4179547dca04df2d41b376fab789365a624514d36ee2cd50863d66cb313c57079c0efbd19421ec741e6e3e9
-
SSDEEP
1536:99+rXOFfiwNQl4YpGZeI3JW/cbN2v0/zIXXx9fLEMYoKmBHDBGUJ0e1G:T+DOYl4etI5WiGEzIX/fVYUKU6ew
Static task
static1
Behavioral task
behavioral1
Sample
6ecd8a0ad689cc8306f6d5de4cac5448ca8a33b2f0f3920f6c2dbc507290ce2a.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6ecd8a0ad689cc8306f6d5de4cac5448ca8a33b2f0f3920f6c2dbc507290ce2a
-
Size
96KB
-
MD5
039f86af89df1dc16e2802b00006aef7
-
SHA1
b8278726c0d3722c4fc766df8f7f1312d897869d
-
SHA256
6ecd8a0ad689cc8306f6d5de4cac5448ca8a33b2f0f3920f6c2dbc507290ce2a
-
SHA512
b75954e109644cd9bf0196444a9833e0de4a167ed4179547dca04df2d41b376fab789365a624514d36ee2cd50863d66cb313c57079c0efbd19421ec741e6e3e9
-
SSDEEP
1536:99+rXOFfiwNQl4YpGZeI3JW/cbN2v0/zIXXx9fLEMYoKmBHDBGUJ0e1G:T+DOYl4etI5WiGEzIX/fVYUKU6ew
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5