General
-
Target
afdd32086e35d7c9f209360f6253e9838745eb0dedaa610ec013e5e345ac8f7fN.exe
-
Size
120KB
-
Sample
241206-2mx1naxqap
-
MD5
4a4b6804f269588afb5c76c4a5245300
-
SHA1
b00c26c89a2b28e42a9dc8cdcf2990bd1ec48b4f
-
SHA256
afdd32086e35d7c9f209360f6253e9838745eb0dedaa610ec013e5e345ac8f7f
-
SHA512
5cab19b04195c6fcd9c9c2c56f59024dc5f86201f29c264bd771f040e6487532ce10c795ef3407c9806f097ee708c1951c850ee831e0c75d595fedb931f965a5
-
SSDEEP
1536:1NDpJwXf4+dU5ia8IsBwen/OoerqVkCNrXKWk7Z4BH2dXXbnhRVFtfBKndnri0no:TrwXf4TgVqe/NHiCp6W0S92FLnNTSPS
Static task
static1
Behavioral task
behavioral1
Sample
afdd32086e35d7c9f209360f6253e9838745eb0dedaa610ec013e5e345ac8f7fN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
afdd32086e35d7c9f209360f6253e9838745eb0dedaa610ec013e5e345ac8f7fN.exe
-
Size
120KB
-
MD5
4a4b6804f269588afb5c76c4a5245300
-
SHA1
b00c26c89a2b28e42a9dc8cdcf2990bd1ec48b4f
-
SHA256
afdd32086e35d7c9f209360f6253e9838745eb0dedaa610ec013e5e345ac8f7f
-
SHA512
5cab19b04195c6fcd9c9c2c56f59024dc5f86201f29c264bd771f040e6487532ce10c795ef3407c9806f097ee708c1951c850ee831e0c75d595fedb931f965a5
-
SSDEEP
1536:1NDpJwXf4+dU5ia8IsBwen/OoerqVkCNrXKWk7Z4BH2dXXbnhRVFtfBKndnri0no:TrwXf4TgVqe/NHiCp6W0S92FLnNTSPS
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5