General
-
Target
760225dc0a1d8524017a479386ca19ff0cf201d6ec00fb963e5ac4539cc60d78
-
Size
3.0MB
-
Sample
250328-3a688svqy8
-
MD5
7fcd0cd0e57d567fbad313f82df4c5c0
-
SHA1
ad1718ffcd82ea641325e7a0f2164cf78db8fcf7
-
SHA256
760225dc0a1d8524017a479386ca19ff0cf201d6ec00fb963e5ac4539cc60d78
-
SHA512
2d1251dca6fa3a6c88b6aa0658b912c6f069a292197e5b4379e42f9c1325a1781886ce5de55bbec2ce45f262d83816fff442af032852455a09ecc25db8e111af
-
SSDEEP
49152:zZ4rujE/CLlVl80CdSI3LdmLgWtAjkhAW86LqmQKzeFH/LNqAznw7v:z+ruj+CLflabdSgGh86OFGUw7v
Static task
static1
Behavioral task
behavioral1
Sample
760225dc0a1d8524017a479386ca19ff0cf201d6ec00fb963e5ac4539cc60d78.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
760225dc0a1d8524017a479386ca19ff0cf201d6ec00fb963e5ac4539cc60d78.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
760225dc0a1d8524017a479386ca19ff0cf201d6ec00fb963e5ac4539cc60d78
-
Size
3.0MB
-
MD5
7fcd0cd0e57d567fbad313f82df4c5c0
-
SHA1
ad1718ffcd82ea641325e7a0f2164cf78db8fcf7
-
SHA256
760225dc0a1d8524017a479386ca19ff0cf201d6ec00fb963e5ac4539cc60d78
-
SHA512
2d1251dca6fa3a6c88b6aa0658b912c6f069a292197e5b4379e42f9c1325a1781886ce5de55bbec2ce45f262d83816fff442af032852455a09ecc25db8e111af
-
SSDEEP
49152:zZ4rujE/CLlVl80CdSI3LdmLgWtAjkhAW86LqmQKzeFH/LNqAznw7v:z+ruj+CLflabdSgGh86OFGUw7v
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1