General
-
Target
cdc959652f25682611790b53673829175a4e673d6107a07b07c32182d7ac1414N.exe
-
Size
97KB
-
Sample
250201-r5m83aymhk
-
MD5
968d71770d1a11eac6183824c271a3f0
-
SHA1
dc2aecfb6a6ba662236f4c2c9158b03e57dbaa90
-
SHA256
cdc959652f25682611790b53673829175a4e673d6107a07b07c32182d7ac1414
-
SHA512
82e6a45898ba78d5b00cbbf2facdfed474d0847de7acec51e2993b923006afb4c97c846450ca46ac1dfbd652c842c7824217eaf0d1ac2c0272f2fffb2038ffa9
-
SSDEEP
1536:YR6higxF18fnp6ZR52kE26tRYCAqKTRAn3P91t34oKWUA:YR6hi2eb2ARYCFYKn33
Static task
static1
Behavioral task
behavioral1
Sample
cdc959652f25682611790b53673829175a4e673d6107a07b07c32182d7ac1414N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cdc959652f25682611790b53673829175a4e673d6107a07b07c32182d7ac1414N.exe
-
Size
97KB
-
MD5
968d71770d1a11eac6183824c271a3f0
-
SHA1
dc2aecfb6a6ba662236f4c2c9158b03e57dbaa90
-
SHA256
cdc959652f25682611790b53673829175a4e673d6107a07b07c32182d7ac1414
-
SHA512
82e6a45898ba78d5b00cbbf2facdfed474d0847de7acec51e2993b923006afb4c97c846450ca46ac1dfbd652c842c7824217eaf0d1ac2c0272f2fffb2038ffa9
-
SSDEEP
1536:YR6higxF18fnp6ZR52kE26tRYCAqKTRAn3P91t34oKWUA:YR6hi2eb2ARYCFYKn33
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5