General
-
Target
7e8cdc2b2fb2be647e326308df596a64139c26d0b68408da9ed73d721c4298ed
-
Size
65KB
-
Sample
250306-gc2kwazwbz
-
MD5
4960ee8f196e6509a5e9f8392a8eed0f
-
SHA1
024ff31daeaf00c7f5acdbe00d357747fdad2e19
-
SHA256
7e8cdc2b2fb2be647e326308df596a64139c26d0b68408da9ed73d721c4298ed
-
SHA512
4c1868dc02bf495adcdb3fcf2282ce0c0e4d5975aaf16ac8a7e13204904fe28cf7125b1251144c28560b4067e95ea6a63499abbe7285748014566982c1df6f02
-
SSDEEP
1536:6B0nOiPT/N/Pwp7lFFDQoxU630TPWvP+mNpx3dpAsOjNSW:aYxYlDn0TPahNpXOjNSW
Static task
static1
Behavioral task
behavioral1
Sample
7e8cdc2b2fb2be647e326308df596a64139c26d0b68408da9ed73d721c4298ed.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7e8cdc2b2fb2be647e326308df596a64139c26d0b68408da9ed73d721c4298ed
-
Size
65KB
-
MD5
4960ee8f196e6509a5e9f8392a8eed0f
-
SHA1
024ff31daeaf00c7f5acdbe00d357747fdad2e19
-
SHA256
7e8cdc2b2fb2be647e326308df596a64139c26d0b68408da9ed73d721c4298ed
-
SHA512
4c1868dc02bf495adcdb3fcf2282ce0c0e4d5975aaf16ac8a7e13204904fe28cf7125b1251144c28560b4067e95ea6a63499abbe7285748014566982c1df6f02
-
SSDEEP
1536:6B0nOiPT/N/Pwp7lFFDQoxU630TPWvP+mNpx3dpAsOjNSW:aYxYlDn0TPahNpXOjNSW
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5