General
-
Target
d7302e63877da49086f2f3363f6bc5fd8d427ee1b721ac89610457795ff5134d.exe
-
Size
65KB
-
Sample
250202-gm9z1aylhz
-
MD5
556efbda9893b4cbb2d95fc40ecc9ad5
-
SHA1
593f6aafd27671c09837ccbee57e334b44ad2c74
-
SHA256
d7302e63877da49086f2f3363f6bc5fd8d427ee1b721ac89610457795ff5134d
-
SHA512
2f3c69a767f8fd0c8a6b67bc029950aa4c1ccec12c1932d4f1ab298b2d796c60dc4fb8da77c311b9a2fbac9cfb4e9d14fda6ff795ff612840387bed1528024d1
-
SSDEEP
1536:dujndM/Ecaz6UbfzITxsP0V7n6sWf33uJbQ94oFR0508a2:UZFpfzITRVD6sWf33ebmL0ta2
Static task
static1
Behavioral task
behavioral1
Sample
d7302e63877da49086f2f3363f6bc5fd8d427ee1b721ac89610457795ff5134d.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d7302e63877da49086f2f3363f6bc5fd8d427ee1b721ac89610457795ff5134d.exe
-
Size
65KB
-
MD5
556efbda9893b4cbb2d95fc40ecc9ad5
-
SHA1
593f6aafd27671c09837ccbee57e334b44ad2c74
-
SHA256
d7302e63877da49086f2f3363f6bc5fd8d427ee1b721ac89610457795ff5134d
-
SHA512
2f3c69a767f8fd0c8a6b67bc029950aa4c1ccec12c1932d4f1ab298b2d796c60dc4fb8da77c311b9a2fbac9cfb4e9d14fda6ff795ff612840387bed1528024d1
-
SSDEEP
1536:dujndM/Ecaz6UbfzITxsP0V7n6sWf33uJbQ94oFR0508a2:UZFpfzITRVD6sWf33ebmL0ta2
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5