General
-
Target
53910b281e1b5571d97c9e187bfeda4595b1cb298f909d78afb2bc37a4518e8eN.exe
-
Size
97KB
-
Sample
250127-clk72avqcy
-
MD5
9478c379fecab50c3d216fd7ee8e96e0
-
SHA1
3c024f84cec3f54068c3e5b9aa829d65a9c54cf0
-
SHA256
53910b281e1b5571d97c9e187bfeda4595b1cb298f909d78afb2bc37a4518e8e
-
SHA512
ad6ba53785d734da6078d2596a93363494f80bed804bb6e3954fc58d23cd95af9d8b0a2553e0724eb4a97b5d57930fbf91bda94c5678ecd08d90c4dfaa7e8dcf
-
SSDEEP
1536:7ztgDSnVIE2AcsrwiexFzseqJ8RhboxwwtpUYpRgbAI4Q6IYc:7zS2ntr/e/sFSRhEPUYpRgZ4DT
Static task
static1
Behavioral task
behavioral1
Sample
53910b281e1b5571d97c9e187bfeda4595b1cb298f909d78afb2bc37a4518e8eN.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
53910b281e1b5571d97c9e187bfeda4595b1cb298f909d78afb2bc37a4518e8eN.exe
-
Size
97KB
-
MD5
9478c379fecab50c3d216fd7ee8e96e0
-
SHA1
3c024f84cec3f54068c3e5b9aa829d65a9c54cf0
-
SHA256
53910b281e1b5571d97c9e187bfeda4595b1cb298f909d78afb2bc37a4518e8e
-
SHA512
ad6ba53785d734da6078d2596a93363494f80bed804bb6e3954fc58d23cd95af9d8b0a2553e0724eb4a97b5d57930fbf91bda94c5678ecd08d90c4dfaa7e8dcf
-
SSDEEP
1536:7ztgDSnVIE2AcsrwiexFzseqJ8RhboxwwtpUYpRgbAI4Q6IYc:7zS2ntr/e/sFSRhEPUYpRgZ4DT
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5