General
-
Target
d4e9da193130af03b33f63530931b324e320f0534502297b33aa587ada9e46a5.exe
-
Size
65KB
-
Sample
250201-smflyazkgr
-
MD5
fca617975c7dda1d7897f714618db6c8
-
SHA1
98a2664bddc72b9217db42bd2bd2de81e0d8d214
-
SHA256
d4e9da193130af03b33f63530931b324e320f0534502297b33aa587ada9e46a5
-
SHA512
a48238aeef3cb91a3ec8c3af2f98f2f1b3bf1b1f26bc34f9d38b11478118701e5bf6e991eafa136abc9b1c7d341a4fc4974921f9ce2f2537fcd3fbb20dcb52e2
-
SSDEEP
1536:R2STtO+h4DxH0yTz6AsGPveoCGSe+lxd5TruHpDynj6wLrr+:R24zGD50+LmonSRd56p0+
Static task
static1
Behavioral task
behavioral1
Sample
d4e9da193130af03b33f63530931b324e320f0534502297b33aa587ada9e46a5.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d4e9da193130af03b33f63530931b324e320f0534502297b33aa587ada9e46a5.exe
-
Size
65KB
-
MD5
fca617975c7dda1d7897f714618db6c8
-
SHA1
98a2664bddc72b9217db42bd2bd2de81e0d8d214
-
SHA256
d4e9da193130af03b33f63530931b324e320f0534502297b33aa587ada9e46a5
-
SHA512
a48238aeef3cb91a3ec8c3af2f98f2f1b3bf1b1f26bc34f9d38b11478118701e5bf6e991eafa136abc9b1c7d341a4fc4974921f9ce2f2537fcd3fbb20dcb52e2
-
SSDEEP
1536:R2STtO+h4DxH0yTz6AsGPveoCGSe+lxd5TruHpDynj6wLrr+:R24zGD50+LmonSRd56p0+
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5