General
-
Target
3ee9804b7a3afd2a0664d69cc1a521bba4a87f4a62997f3ebc595587010ca621.exe
-
Size
65KB
-
Sample
250201-lsmtwawray
-
MD5
a288a365153e547eb0987e6d133d3540
-
SHA1
43e30f698c1226f8ee91df61f9df6560a9b5ab73
-
SHA256
3ee9804b7a3afd2a0664d69cc1a521bba4a87f4a62997f3ebc595587010ca621
-
SHA512
f9173573ddf2990840e0781662a3eba0de1f49afb78a907bc654d9c27a5daa9533f86d90f5d9b2900f6fce26a5c1226149faadb61582136e725588a7b019ac55
-
SSDEEP
1536:pvxIejOBW6LOB5yzKCdUBGlb5+XMnitfoF3zkOuP:pxrOvs5y20t6Mg4DkOk
Static task
static1
Behavioral task
behavioral1
Sample
3ee9804b7a3afd2a0664d69cc1a521bba4a87f4a62997f3ebc595587010ca621.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3ee9804b7a3afd2a0664d69cc1a521bba4a87f4a62997f3ebc595587010ca621.exe
-
Size
65KB
-
MD5
a288a365153e547eb0987e6d133d3540
-
SHA1
43e30f698c1226f8ee91df61f9df6560a9b5ab73
-
SHA256
3ee9804b7a3afd2a0664d69cc1a521bba4a87f4a62997f3ebc595587010ca621
-
SHA512
f9173573ddf2990840e0781662a3eba0de1f49afb78a907bc654d9c27a5daa9533f86d90f5d9b2900f6fce26a5c1226149faadb61582136e725588a7b019ac55
-
SSDEEP
1536:pvxIejOBW6LOB5yzKCdUBGlb5+XMnitfoF3zkOuP:pxrOvs5y20t6Mg4DkOk
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5