General
-
Target
8104822fd5307890699b76343ff39c31a5363b1c966dd9d3f45ec244efed9d45.exe
-
Size
65KB
-
Sample
250202-mvszcaxrhx
-
MD5
31737807c2383155e9cbff83a8978fa2
-
SHA1
628e525b196da1450f127635742cd9617d28f28a
-
SHA256
8104822fd5307890699b76343ff39c31a5363b1c966dd9d3f45ec244efed9d45
-
SHA512
90aacf8bafb1dab4c736023b7bb1f32872726911607d12f293d4c7bf843beb50fc146682eda1cc2da53eb6581109d8f5812138a95b2ddbcdd78607289b8eb682
-
SSDEEP
1536:lEFbnt7dhc39L5LS/kA6/frsZUX3XyaazHpuWA0zcPzR:lIbnxc3XGnHK3DeokcN
Static task
static1
Behavioral task
behavioral1
Sample
8104822fd5307890699b76343ff39c31a5363b1c966dd9d3f45ec244efed9d45.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8104822fd5307890699b76343ff39c31a5363b1c966dd9d3f45ec244efed9d45.exe
-
Size
65KB
-
MD5
31737807c2383155e9cbff83a8978fa2
-
SHA1
628e525b196da1450f127635742cd9617d28f28a
-
SHA256
8104822fd5307890699b76343ff39c31a5363b1c966dd9d3f45ec244efed9d45
-
SHA512
90aacf8bafb1dab4c736023b7bb1f32872726911607d12f293d4c7bf843beb50fc146682eda1cc2da53eb6581109d8f5812138a95b2ddbcdd78607289b8eb682
-
SSDEEP
1536:lEFbnt7dhc39L5LS/kA6/frsZUX3XyaazHpuWA0zcPzR:lIbnxc3XGnHK3DeokcN
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5