General
-
Target
1b83b5ddedaaf320b9e063d491c098ceb312690de58ad0aea6654e9c0339139c.exe
-
Size
65KB
-
Sample
250201-w9hatsvmbs
-
MD5
82348fece007a579a0e02e34fe35b629
-
SHA1
19a113eecc993752b3a3c00ddba1d8031016afe2
-
SHA256
1b83b5ddedaaf320b9e063d491c098ceb312690de58ad0aea6654e9c0339139c
-
SHA512
ffb0ceaecdf7fc9adddf6019c9df496ccb93003c9e44083209d585baa1d769faad7f703249d9d7e3f21d4f8e339e44643be4d9294c4d31a7acf167f79fb223fd
-
SSDEEP
1536:5mKZw/oN5U6IZruHCc7NoQR2hmeejL0QvEylaZal2X3LoLKnDSGoE:lqoTNoQIwplMylBE35nbj
Static task
static1
Behavioral task
behavioral1
Sample
1b83b5ddedaaf320b9e063d491c098ceb312690de58ad0aea6654e9c0339139c.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1b83b5ddedaaf320b9e063d491c098ceb312690de58ad0aea6654e9c0339139c.exe
-
Size
65KB
-
MD5
82348fece007a579a0e02e34fe35b629
-
SHA1
19a113eecc993752b3a3c00ddba1d8031016afe2
-
SHA256
1b83b5ddedaaf320b9e063d491c098ceb312690de58ad0aea6654e9c0339139c
-
SHA512
ffb0ceaecdf7fc9adddf6019c9df496ccb93003c9e44083209d585baa1d769faad7f703249d9d7e3f21d4f8e339e44643be4d9294c4d31a7acf167f79fb223fd
-
SSDEEP
1536:5mKZw/oN5U6IZruHCc7NoQR2hmeejL0QvEylaZal2X3LoLKnDSGoE:lqoTNoQIwplMylBE35nbj
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5