General
-
Target
a6a56ef8c3bdc6d7d424e018194bc9b7e10ee4648246305705387a83f37caac8
-
Size
97KB
-
Sample
250306-kmdtcavky8
-
MD5
3b7b83a8d888e8e18cc6cc5794030b4d
-
SHA1
d50366b250bce444e3d0e2564e474ced1467dfc3
-
SHA256
a6a56ef8c3bdc6d7d424e018194bc9b7e10ee4648246305705387a83f37caac8
-
SHA512
53167203566f4d19b2f8ef564ba22058fcfc531495254683b9296439e2c4daa861e762f86ead4966894726358a52985d5471c8d701137d200419b993ab68aa5e
-
SSDEEP
1536:uKn91b/Mv4huF29I/UWCFdEAMdtRF0V9SXK3Xu5:uMBC422WVUz8zF0Sa3e
Static task
static1
Behavioral task
behavioral1
Sample
a6a56ef8c3bdc6d7d424e018194bc9b7e10ee4648246305705387a83f37caac8.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a6a56ef8c3bdc6d7d424e018194bc9b7e10ee4648246305705387a83f37caac8
-
Size
97KB
-
MD5
3b7b83a8d888e8e18cc6cc5794030b4d
-
SHA1
d50366b250bce444e3d0e2564e474ced1467dfc3
-
SHA256
a6a56ef8c3bdc6d7d424e018194bc9b7e10ee4648246305705387a83f37caac8
-
SHA512
53167203566f4d19b2f8ef564ba22058fcfc531495254683b9296439e2c4daa861e762f86ead4966894726358a52985d5471c8d701137d200419b993ab68aa5e
-
SSDEEP
1536:uKn91b/Mv4huF29I/UWCFdEAMdtRF0V9SXK3Xu5:uMBC422WVUz8zF0Sa3e
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5