General
-
Target
17b968b0bb41b5255098449365c43d6f8b6f5d1b56f9c47a285ca9e88638bf29N.exe
-
Size
65KB
-
Sample
250205-c9g6aavrbt
-
MD5
da301004589ad575daaddc787897d3c0
-
SHA1
a0c54208df96dd4e3489e8875490a20d906b61e1
-
SHA256
17b968b0bb41b5255098449365c43d6f8b6f5d1b56f9c47a285ca9e88638bf29
-
SHA512
0963b43adcebdb06c7264a2a2274b7ba24aeb3254a12035bef451449a2860bac133171c12f3923ccc098973dc93eb20c3fdf4b29cf58539038e749d348923b22
-
SSDEEP
1536:pi1C80Joh+28OaWDcDNzIS64yugSPkXTXhBex:/QfTHodIj4ykkXTLex
Static task
static1
Behavioral task
behavioral1
Sample
17b968b0bb41b5255098449365c43d6f8b6f5d1b56f9c47a285ca9e88638bf29N.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
17b968b0bb41b5255098449365c43d6f8b6f5d1b56f9c47a285ca9e88638bf29N.exe
-
Size
65KB
-
MD5
da301004589ad575daaddc787897d3c0
-
SHA1
a0c54208df96dd4e3489e8875490a20d906b61e1
-
SHA256
17b968b0bb41b5255098449365c43d6f8b6f5d1b56f9c47a285ca9e88638bf29
-
SHA512
0963b43adcebdb06c7264a2a2274b7ba24aeb3254a12035bef451449a2860bac133171c12f3923ccc098973dc93eb20c3fdf4b29cf58539038e749d348923b22
-
SSDEEP
1536:pi1C80Joh+28OaWDcDNzIS64yugSPkXTXhBex:/QfTHodIj4ykkXTLex
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5