General
-
Target
e9e003855795ac90ceace19f26c1e9b825531a7048450f39dc287a5107363f09
-
Size
120KB
-
Sample
241206-ef37rsvkdq
-
MD5
ff26bb5a62a04dcb4598f63cb8465d45
-
SHA1
c39fa7babcdd8edbea922e6c72ee35694d2f0d97
-
SHA256
e9e003855795ac90ceace19f26c1e9b825531a7048450f39dc287a5107363f09
-
SHA512
0b21c824fb858d3facf86813294fa7564365073c05af820b374cd9d551147f1c76f32f2f2e0512349330b79fa194f6b946511581f961ffc44c11b03613aedf96
-
SSDEEP
1536:kkCU8bTjEWoTWYQpAfMfX0JxhH1bumZTJJabuPWYtm8TgeP4mSqCkb9Ea9tuMxtu:gUTRF51lZTJJa6WQsm4mAwuUcMLu
Static task
static1
Behavioral task
behavioral1
Sample
e9e003855795ac90ceace19f26c1e9b825531a7048450f39dc287a5107363f09.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e9e003855795ac90ceace19f26c1e9b825531a7048450f39dc287a5107363f09
-
Size
120KB
-
MD5
ff26bb5a62a04dcb4598f63cb8465d45
-
SHA1
c39fa7babcdd8edbea922e6c72ee35694d2f0d97
-
SHA256
e9e003855795ac90ceace19f26c1e9b825531a7048450f39dc287a5107363f09
-
SHA512
0b21c824fb858d3facf86813294fa7564365073c05af820b374cd9d551147f1c76f32f2f2e0512349330b79fa194f6b946511581f961ffc44c11b03613aedf96
-
SSDEEP
1536:kkCU8bTjEWoTWYQpAfMfX0JxhH1bumZTJJabuPWYtm8TgeP4mSqCkb9Ea9tuMxtu:gUTRF51lZTJJa6WQsm4mAwuUcMLu
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5