General
-
Target
867e758a4458c83427049688a6f0073a15d59aeb3c12939b3b5d8c86371ce336.exe
-
Size
65KB
-
Sample
250201-zhb7aazjg1
-
MD5
6648556e0b27d487248fa1546e7a5084
-
SHA1
bbbfebcae77a05f04f8bb3a20ec5417df68df29a
-
SHA256
867e758a4458c83427049688a6f0073a15d59aeb3c12939b3b5d8c86371ce336
-
SHA512
590a7984930c1fe26c55cce65b1e2d265823a4b1eeca4e8474e7979121bf38ebb7c251c8920846c330a5dcc7ff9466e3186b98a9ad3bcb947266dfc2bc92fc00
-
SSDEEP
768:gHmApm2/mwlqUDAd78YtW9SR33yA7LIL1tDBdmHQcJ1q3Mkij3gI+7Ku0nOgDZjQ:gGnYmwmd9R33YZ5BdsQcJk0rDuZgV8
Static task
static1
Behavioral task
behavioral1
Sample
867e758a4458c83427049688a6f0073a15d59aeb3c12939b3b5d8c86371ce336.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
867e758a4458c83427049688a6f0073a15d59aeb3c12939b3b5d8c86371ce336.exe
-
Size
65KB
-
MD5
6648556e0b27d487248fa1546e7a5084
-
SHA1
bbbfebcae77a05f04f8bb3a20ec5417df68df29a
-
SHA256
867e758a4458c83427049688a6f0073a15d59aeb3c12939b3b5d8c86371ce336
-
SHA512
590a7984930c1fe26c55cce65b1e2d265823a4b1eeca4e8474e7979121bf38ebb7c251c8920846c330a5dcc7ff9466e3186b98a9ad3bcb947266dfc2bc92fc00
-
SSDEEP
768:gHmApm2/mwlqUDAd78YtW9SR33yA7LIL1tDBdmHQcJ1q3Mkij3gI+7Ku0nOgDZjQ:gGnYmwmd9R33YZ5BdsQcJk0rDuZgV8
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5