General
-
Target
d56e43132cda85299c805917cb2d7afb2569a08e66ece38e3027bbb43913dc70N.exe
-
Size
120KB
-
Sample
241206-q7pn8swnhl
-
MD5
14c2ba6217af871f265e991559f68fb0
-
SHA1
471cee025e71dd32182b6d0008521494e46237a7
-
SHA256
d56e43132cda85299c805917cb2d7afb2569a08e66ece38e3027bbb43913dc70
-
SHA512
28774b4ff5702ec7f128374024225f8d006f1a700d23ff2bbc38b7e0b35fd15aaab00de4ebb59093b76f2cd2b3b72307ada07f623cf2d0609560ead261c46aa1
-
SSDEEP
3072:937hGWP19X5hWaoIC+B+jboGLmXDd1EEdDyU4Y:5dT1h8l+akuWd1nDyUb
Static task
static1
Behavioral task
behavioral1
Sample
d56e43132cda85299c805917cb2d7afb2569a08e66ece38e3027bbb43913dc70N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d56e43132cda85299c805917cb2d7afb2569a08e66ece38e3027bbb43913dc70N.exe
-
Size
120KB
-
MD5
14c2ba6217af871f265e991559f68fb0
-
SHA1
471cee025e71dd32182b6d0008521494e46237a7
-
SHA256
d56e43132cda85299c805917cb2d7afb2569a08e66ece38e3027bbb43913dc70
-
SHA512
28774b4ff5702ec7f128374024225f8d006f1a700d23ff2bbc38b7e0b35fd15aaab00de4ebb59093b76f2cd2b3b72307ada07f623cf2d0609560ead261c46aa1
-
SSDEEP
3072:937hGWP19X5hWaoIC+B+jboGLmXDd1EEdDyU4Y:5dT1h8l+akuWd1nDyUb
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5