General
-
Target
b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71N.exe
-
Size
120KB
-
Sample
241204-2dv5psvjfy
-
MD5
ef5aeeb9c7064b6ffa40e7dc93291c50
-
SHA1
f72858c2d18c0d47986ba84851ef5eb3ebb4dd05
-
SHA256
b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71
-
SHA512
20a4326bfd38af3249435e89644ca2a3be217e9f77667530cf3a269b17adf7fe7e7e877572d71233672026b149e84c37996c23837347b0f891cc4c9fa10723e6
-
SSDEEP
3072:LCixXchlE7LpWYcyu9HtFiyB0KHX7T34c:L32h678DyugyBLL74c
Static task
static1
Behavioral task
behavioral1
Sample
b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71N.exe
-
Size
120KB
-
MD5
ef5aeeb9c7064b6ffa40e7dc93291c50
-
SHA1
f72858c2d18c0d47986ba84851ef5eb3ebb4dd05
-
SHA256
b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71
-
SHA512
20a4326bfd38af3249435e89644ca2a3be217e9f77667530cf3a269b17adf7fe7e7e877572d71233672026b149e84c37996c23837347b0f891cc4c9fa10723e6
-
SSDEEP
3072:LCixXchlE7LpWYcyu9HtFiyB0KHX7T34c:L32h678DyugyBLL74c
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5