General
-
Target
b42bc91ceb93238f485c1d9d2e27154f3a4b2797f7fdd3056815a9de8850d7eeN.exe
-
Size
65KB
-
Sample
250202-pncpwstmfr
-
MD5
3382434050046654751e4c1d3b291af0
-
SHA1
c8b2cd7034883966d2738c918e47a7512367c2c0
-
SHA256
b42bc91ceb93238f485c1d9d2e27154f3a4b2797f7fdd3056815a9de8850d7ee
-
SHA512
9cb90a0d0eadd060ad33cb232da6b279ce09f2a362a6481dfe30b4f52bf1296af9a15309400a0ee798895e0e6fb1d52138ad70b601c56ebd70a7db68e917d015
-
SSDEEP
1536:0fE9yqNxVD+4J5rgoFXRzogNHcRubv8N3obxUEbBf:0e+e5rgZgeub0N310Bf
Static task
static1
Behavioral task
behavioral1
Sample
b42bc91ceb93238f485c1d9d2e27154f3a4b2797f7fdd3056815a9de8850d7eeN.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b42bc91ceb93238f485c1d9d2e27154f3a4b2797f7fdd3056815a9de8850d7eeN.exe
-
Size
65KB
-
MD5
3382434050046654751e4c1d3b291af0
-
SHA1
c8b2cd7034883966d2738c918e47a7512367c2c0
-
SHA256
b42bc91ceb93238f485c1d9d2e27154f3a4b2797f7fdd3056815a9de8850d7ee
-
SHA512
9cb90a0d0eadd060ad33cb232da6b279ce09f2a362a6481dfe30b4f52bf1296af9a15309400a0ee798895e0e6fb1d52138ad70b601c56ebd70a7db68e917d015
-
SSDEEP
1536:0fE9yqNxVD+4J5rgoFXRzogNHcRubv8N3obxUEbBf:0e+e5rgZgeub0N310Bf
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5