General
-
Target
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.exe
-
Size
120KB
-
Sample
241206-q92fta1jas
-
MD5
f0c8288cc6dc225b1db902a84e4ffbc0
-
SHA1
6bea47dbbbfc0ac78d2cfa8ef2b698c7ea1fdb35
-
SHA256
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142
-
SHA512
a2db9842f85927bede519297ec57697e6d257473df9a66c20281303f35d684464850cde1eb9328563e5b12bcca8d634dec0f98ad4fe51709a6e953108c2bf2ae
-
SSDEEP
3072:79MvdYipneTiQ85dkWH3xWD2EP+ED40zN:w1deTXY+AxWHz
Static task
static1
Behavioral task
behavioral1
Sample
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142N.exe
-
Size
120KB
-
MD5
f0c8288cc6dc225b1db902a84e4ffbc0
-
SHA1
6bea47dbbbfc0ac78d2cfa8ef2b698c7ea1fdb35
-
SHA256
9f4507cfc67278bdf47e2ba1ec2f0cf445fc63703213fd983b90394acacab142
-
SHA512
a2db9842f85927bede519297ec57697e6d257473df9a66c20281303f35d684464850cde1eb9328563e5b12bcca8d634dec0f98ad4fe51709a6e953108c2bf2ae
-
SSDEEP
3072:79MvdYipneTiQ85dkWH3xWD2EP+ED40zN:w1deTXY+AxWHz
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5