General
-
Target
1ea7b1aca1a93ae98f4253cc7e7ef9e611d8e5b0e18a7cb82b58724d31a3c8fe.exe
-
Size
120KB
-
Sample
241122-jmrvjaspgm
-
MD5
301674d448046d471017b7f300a6ccc4
-
SHA1
a668bcfbd73385fc7259db685b4a91d0b00eefbf
-
SHA256
1ea7b1aca1a93ae98f4253cc7e7ef9e611d8e5b0e18a7cb82b58724d31a3c8fe
-
SHA512
b416cca1da330dfa5b1405207cb97db0cec948cb87590a21dd5ffe58ccfd02c991373f794ce7ab2ecaf670a2aeb11ac2ff8c57f2069fee0ec09a760ded3f3bd2
-
SSDEEP
3072:jsrRr2bMQbro3dGfwBLuh6kcepe9LByutS:jsrRr2bpmdGfwBnnySS
Static task
static1
Behavioral task
behavioral1
Sample
1ea7b1aca1a93ae98f4253cc7e7ef9e611d8e5b0e18a7cb82b58724d31a3c8fe.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1ea7b1aca1a93ae98f4253cc7e7ef9e611d8e5b0e18a7cb82b58724d31a3c8fe.exe
-
Size
120KB
-
MD5
301674d448046d471017b7f300a6ccc4
-
SHA1
a668bcfbd73385fc7259db685b4a91d0b00eefbf
-
SHA256
1ea7b1aca1a93ae98f4253cc7e7ef9e611d8e5b0e18a7cb82b58724d31a3c8fe
-
SHA512
b416cca1da330dfa5b1405207cb97db0cec948cb87590a21dd5ffe58ccfd02c991373f794ce7ab2ecaf670a2aeb11ac2ff8c57f2069fee0ec09a760ded3f3bd2
-
SSDEEP
3072:jsrRr2bMQbro3dGfwBLuh6kcepe9LByutS:jsrRr2bpmdGfwBnnySS
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5