General
-
Target
08095b1f5cee88c69f6789de3a592a1e7a549d792d13e9a18ccc29a71a18f38d
-
Size
3.0MB
-
Sample
250328-z5c24atjs6
-
MD5
c07af5ef20b404b6a1a31e5a83b3e013
-
SHA1
dc10762a193bc86d9b432b31667e8445210e4d08
-
SHA256
08095b1f5cee88c69f6789de3a592a1e7a549d792d13e9a18ccc29a71a18f38d
-
SHA512
3267a68376a4eec8bd58bee7c0f5e341b28f523b0e133353c980ac604182ec65037c51e6a17677a240ca146f82f38e57f7ea3ec274dd26e5b02af8a5bf5d3fbc
-
SSDEEP
49152:5Z4rujE/CLlVl80CdSI3LdmLgWtAjkhAc86LqmQKzeFH/LNqAznwQS0:5+ruj+CLflabdSgGhy6OFGUw/0
Static task
static1
Behavioral task
behavioral1
Sample
08095b1f5cee88c69f6789de3a592a1e7a549d792d13e9a18ccc29a71a18f38d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08095b1f5cee88c69f6789de3a592a1e7a549d792d13e9a18ccc29a71a18f38d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
08095b1f5cee88c69f6789de3a592a1e7a549d792d13e9a18ccc29a71a18f38d
-
Size
3.0MB
-
MD5
c07af5ef20b404b6a1a31e5a83b3e013
-
SHA1
dc10762a193bc86d9b432b31667e8445210e4d08
-
SHA256
08095b1f5cee88c69f6789de3a592a1e7a549d792d13e9a18ccc29a71a18f38d
-
SHA512
3267a68376a4eec8bd58bee7c0f5e341b28f523b0e133353c980ac604182ec65037c51e6a17677a240ca146f82f38e57f7ea3ec274dd26e5b02af8a5bf5d3fbc
-
SSDEEP
49152:5Z4rujE/CLlVl80CdSI3LdmLgWtAjkhAc86LqmQKzeFH/LNqAznwQS0:5+ruj+CLflabdSgGhy6OFGUw/0
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1