General
-
Target
5c1f18ecef56e6ca4a7db42fd13d0b2eb055aa1fd9cdf866630db63d4a8ddc14N.exe
-
Size
97KB
-
Sample
250127-d5d4hazlcr
-
MD5
d6749ce9dcd607e0a8f3f34fbd699cc0
-
SHA1
538c6f7706e29d378d672033daec9c04de2f2000
-
SHA256
5c1f18ecef56e6ca4a7db42fd13d0b2eb055aa1fd9cdf866630db63d4a8ddc14
-
SHA512
b6af0e9c3e76d51f44b1e3c7c6dfc0940cc6882800ca4abf2e7f3fa2ef2b0f9563ebb441d5040144e752fa9bd3dc6c36078fe9573dc71282fca361045539f18b
-
SSDEEP
1536:5xL7+Reid88kYzbAYGEr24G0u8nVqufo7Dt4b1JuZeFxcGu:vS88kY/R/2/Gn3AaDGy2G
Static task
static1
Behavioral task
behavioral1
Sample
5c1f18ecef56e6ca4a7db42fd13d0b2eb055aa1fd9cdf866630db63d4a8ddc14N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5c1f18ecef56e6ca4a7db42fd13d0b2eb055aa1fd9cdf866630db63d4a8ddc14N.exe
-
Size
97KB
-
MD5
d6749ce9dcd607e0a8f3f34fbd699cc0
-
SHA1
538c6f7706e29d378d672033daec9c04de2f2000
-
SHA256
5c1f18ecef56e6ca4a7db42fd13d0b2eb055aa1fd9cdf866630db63d4a8ddc14
-
SHA512
b6af0e9c3e76d51f44b1e3c7c6dfc0940cc6882800ca4abf2e7f3fa2ef2b0f9563ebb441d5040144e752fa9bd3dc6c36078fe9573dc71282fca361045539f18b
-
SSDEEP
1536:5xL7+Reid88kYzbAYGEr24G0u8nVqufo7Dt4b1JuZeFxcGu:vS88kY/R/2/Gn3AaDGy2G
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5