General
-
Target
8495820dff405411b583506d7fc8957dda5896bbca3026f623cdff8d55202a10
-
Size
798KB
-
Sample
250203-hhv6qatlgs
-
MD5
5e97b77494e9a232d41fd412c2e0e5f1
-
SHA1
5509ff42481ba325cc9c42bc6da8d3fac1c0cd8f
-
SHA256
8495820dff405411b583506d7fc8957dda5896bbca3026f623cdff8d55202a10
-
SHA512
61c944ec76eaac64070b2ec6f0c1eeeedce10417eac9b70deb4fb6a9270b7a552ec80ba7470b26bed3c5de2f45e5f8a8bcd076794f46eed34b802c8437344e56
-
SSDEEP
12288:AITsqgmDWSpR+Gqc1gOSJVSKdet5RVu5ihnYQspCp9qWvX9fRBZtVRnOB:AIXgCWSpRycdSJVDsVu5unzqWvX1fVs
Static task
static1
Behavioral task
behavioral1
Sample
8495820dff405411b583506d7fc8957dda5896bbca3026f623cdff8d55202a10.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8495820dff405411b583506d7fc8957dda5896bbca3026f623cdff8d55202a10
-
Size
798KB
-
MD5
5e97b77494e9a232d41fd412c2e0e5f1
-
SHA1
5509ff42481ba325cc9c42bc6da8d3fac1c0cd8f
-
SHA256
8495820dff405411b583506d7fc8957dda5896bbca3026f623cdff8d55202a10
-
SHA512
61c944ec76eaac64070b2ec6f0c1eeeedce10417eac9b70deb4fb6a9270b7a552ec80ba7470b26bed3c5de2f45e5f8a8bcd076794f46eed34b802c8437344e56
-
SSDEEP
12288:AITsqgmDWSpR+Gqc1gOSJVSKdet5RVu5ihnYQspCp9qWvX9fRBZtVRnOB:AIXgCWSpRycdSJVDsVu5unzqWvX1fVs
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5