General
-
Target
f01cda4c31042ea691078fa1c159b995df2b1a7ca83164394fc249c5de64b04e.exe
-
Size
120KB
-
Sample
241204-kaha1ayrht
-
MD5
4c5dbd706adc87c9df197887ed353b01
-
SHA1
ac13abbaf997040e9e2fa77149a9afde4aea60fc
-
SHA256
f01cda4c31042ea691078fa1c159b995df2b1a7ca83164394fc249c5de64b04e
-
SHA512
9da16c3babb31b88bf594d1ab2875ac6955303ba573d75abc92b20db07e73d1a9a920c0785e490bb6df089ddd3b3dccf3cbba0545d837fca0bf49e3146808d02
-
SSDEEP
3072:Uuh/GA+KvbR5klvbyJS/QnlwJoIfirgUsQN:1GAlvV4wnyJfi8Ry
Static task
static1
Behavioral task
behavioral1
Sample
f01cda4c31042ea691078fa1c159b995df2b1a7ca83164394fc249c5de64b04e.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f01cda4c31042ea691078fa1c159b995df2b1a7ca83164394fc249c5de64b04e.exe
-
Size
120KB
-
MD5
4c5dbd706adc87c9df197887ed353b01
-
SHA1
ac13abbaf997040e9e2fa77149a9afde4aea60fc
-
SHA256
f01cda4c31042ea691078fa1c159b995df2b1a7ca83164394fc249c5de64b04e
-
SHA512
9da16c3babb31b88bf594d1ab2875ac6955303ba573d75abc92b20db07e73d1a9a920c0785e490bb6df089ddd3b3dccf3cbba0545d837fca0bf49e3146808d02
-
SSDEEP
3072:Uuh/GA+KvbR5klvbyJS/QnlwJoIfirgUsQN:1GAlvV4wnyJfi8Ry
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5