General
-
Target
f55e4118cbbd4a71d6ecb125c5444cba34054a1307dca6a65a7bb3b6e4243538.exe
-
Size
65KB
-
Sample
250202-ghtgfsznhj
-
MD5
03931421885b46f88499d6d3959974a8
-
SHA1
fa7814660e0427d20ce9e3c2c90716df33910dd2
-
SHA256
f55e4118cbbd4a71d6ecb125c5444cba34054a1307dca6a65a7bb3b6e4243538
-
SHA512
0030703ed59783d49436dd8267042071b980d87a55f314c974e96eb73dfa16995307381ce3345263b6a62b7d9ba90484a6b1f23117be96a6bcc7a24f0cd3fab2
-
SSDEEP
1536:PWZ77pwwTigeVimcYsYAzKpaa9hHIl/1v7NxYZ8P9H6e1G99cPY2mQpE:Ox7uw2QmcL+paUHgvlPtnYAPYn6E
Static task
static1
Behavioral task
behavioral1
Sample
f55e4118cbbd4a71d6ecb125c5444cba34054a1307dca6a65a7bb3b6e4243538.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f55e4118cbbd4a71d6ecb125c5444cba34054a1307dca6a65a7bb3b6e4243538.exe
-
Size
65KB
-
MD5
03931421885b46f88499d6d3959974a8
-
SHA1
fa7814660e0427d20ce9e3c2c90716df33910dd2
-
SHA256
f55e4118cbbd4a71d6ecb125c5444cba34054a1307dca6a65a7bb3b6e4243538
-
SHA512
0030703ed59783d49436dd8267042071b980d87a55f314c974e96eb73dfa16995307381ce3345263b6a62b7d9ba90484a6b1f23117be96a6bcc7a24f0cd3fab2
-
SSDEEP
1536:PWZ77pwwTigeVimcYsYAzKpaa9hHIl/1v7NxYZ8P9H6e1G99cPY2mQpE:Ox7uw2QmcL+paUHgvlPtnYAPYn6E
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5