General
-
Target
34e0cd7282affc0f2aaea312f0aff75ce5ede691667ede8b1ed6c53911d5718b
-
Size
65KB
-
Sample
250305-249qsasmt7
-
MD5
3f5cb3672604d129919ce001723f79a8
-
SHA1
d082e409aaa21d9c878bf7d6dd98f069ed13b7ac
-
SHA256
34e0cd7282affc0f2aaea312f0aff75ce5ede691667ede8b1ed6c53911d5718b
-
SHA512
e6e601eee6190e393d5ceb2acb3ce5b488b37cf0d201447a5efb35da7388ee71359552f0d1550aac92a49e8e06c2503e9740f8f6fdf0610a6c54fde3d0bdfb9e
-
SSDEEP
768:MaAEHyr3zPzbhB1cBDQ5e8ydIlKE3r94bEvYKoG8gzs/phw+UusxEfYeInN/cpJD:Matyr3Hn1cV6v3KEmqshIEdIk8b4
Static task
static1
Behavioral task
behavioral1
Sample
34e0cd7282affc0f2aaea312f0aff75ce5ede691667ede8b1ed6c53911d5718b.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
34e0cd7282affc0f2aaea312f0aff75ce5ede691667ede8b1ed6c53911d5718b
-
Size
65KB
-
MD5
3f5cb3672604d129919ce001723f79a8
-
SHA1
d082e409aaa21d9c878bf7d6dd98f069ed13b7ac
-
SHA256
34e0cd7282affc0f2aaea312f0aff75ce5ede691667ede8b1ed6c53911d5718b
-
SHA512
e6e601eee6190e393d5ceb2acb3ce5b488b37cf0d201447a5efb35da7388ee71359552f0d1550aac92a49e8e06c2503e9740f8f6fdf0610a6c54fde3d0bdfb9e
-
SSDEEP
768:MaAEHyr3zPzbhB1cBDQ5e8ydIlKE3r94bEvYKoG8gzs/phw+UusxEfYeInN/cpJD:Matyr3Hn1cV6v3KEmqshIEdIk8b4
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5