General
-
Target
7ccefb49ae48f4c4f405fd7a15c617624813eafd8c0d0561536bd522050fe72e
-
Size
3.0MB
-
Sample
250328-1qnqqatmt6
-
MD5
9599f8de69efe5d65200f9faeba5fe75
-
SHA1
72c594eee888bf9a39d619be1ed8a95600e18e21
-
SHA256
7ccefb49ae48f4c4f405fd7a15c617624813eafd8c0d0561536bd522050fe72e
-
SHA512
13aa770290c5939a327f374c0e5c2440854d44b951acf1ad33179244f910c4c155666256240b730d20a83e5bc8c3b5cfbf0e0a1c65492fc40fe2225422b9edc8
-
SSDEEP
49152:sZ4rujE/CLlVl80CdSI3LdmLgWtAjkhAy86LqmQKzeFH/LNqAznwWm:s+ruj+CLflabdSgGhQ6OFGUwT
Static task
static1
Behavioral task
behavioral1
Sample
7ccefb49ae48f4c4f405fd7a15c617624813eafd8c0d0561536bd522050fe72e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7ccefb49ae48f4c4f405fd7a15c617624813eafd8c0d0561536bd522050fe72e.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7ccefb49ae48f4c4f405fd7a15c617624813eafd8c0d0561536bd522050fe72e
-
Size
3.0MB
-
MD5
9599f8de69efe5d65200f9faeba5fe75
-
SHA1
72c594eee888bf9a39d619be1ed8a95600e18e21
-
SHA256
7ccefb49ae48f4c4f405fd7a15c617624813eafd8c0d0561536bd522050fe72e
-
SHA512
13aa770290c5939a327f374c0e5c2440854d44b951acf1ad33179244f910c4c155666256240b730d20a83e5bc8c3b5cfbf0e0a1c65492fc40fe2225422b9edc8
-
SSDEEP
49152:sZ4rujE/CLlVl80CdSI3LdmLgWtAjkhAy86LqmQKzeFH/LNqAznwWm:s+ruj+CLflabdSgGhQ6OFGUwT
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Sets service image path in registry
-
Windows security modification
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6