General
-
Target
f04ddb291ef451ce09063e8e58662987748cc872e103f727f6bc1792763c3f1d.exe
-
Size
3.3MB
-
Sample
250208-dtrkfsskf1
-
MD5
8e1c5c22ef0a0b4b674fdfaddea71647
-
SHA1
d5322ab836428594a389f2b6a3be7e06292c21ca
-
SHA256
f04ddb291ef451ce09063e8e58662987748cc872e103f727f6bc1792763c3f1d
-
SHA512
f6e80af089f0657f5b25d670625f4d45de830132e6818bd0189cb632e328a4d3ce1f05ef127805d94bb9cccdff55b866feff98d0846587a17e276494613e4533
-
SSDEEP
98304:nYISAAAAAAAAAKAAAAAAAAAA3AAAAAAAAAAwAAAAAAAAAAK+T5Y:nYDAAAAAAAAAKAAAAAAAAAA3AAAAAAAW
Static task
static1
Behavioral task
behavioral1
Sample
f04ddb291ef451ce09063e8e58662987748cc872e103f727f6bc1792763c3f1d.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f04ddb291ef451ce09063e8e58662987748cc872e103f727f6bc1792763c3f1d.exe
-
Size
3.3MB
-
MD5
8e1c5c22ef0a0b4b674fdfaddea71647
-
SHA1
d5322ab836428594a389f2b6a3be7e06292c21ca
-
SHA256
f04ddb291ef451ce09063e8e58662987748cc872e103f727f6bc1792763c3f1d
-
SHA512
f6e80af089f0657f5b25d670625f4d45de830132e6818bd0189cb632e328a4d3ce1f05ef127805d94bb9cccdff55b866feff98d0846587a17e276494613e4533
-
SSDEEP
98304:nYISAAAAAAAAAKAAAAAAAAAA3AAAAAAAAAAwAAAAAAAAAAK+T5Y:nYDAAAAAAAAAKAAAAAAAAAA3AAAAAAAW
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Downloads MZ/PE file
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5