General
-
Target
43534397fa68642527d6dfdf6f0aa99f40d43cfdfd6a0587cb336648e9476cb8N.exe
-
Size
120KB
-
Sample
241206-r82kvsspfy
-
MD5
fc2a1c99c4afae694c2671e8db0cd2d0
-
SHA1
1fd7ae6821e4cd048066a33c802dcb95c3ebbbe2
-
SHA256
43534397fa68642527d6dfdf6f0aa99f40d43cfdfd6a0587cb336648e9476cb8
-
SHA512
0a11653d627385d63c703e2d4c60ca89fb506e9c89db726f8e0b0a8d9a6b57340a5ce25cf8efba0218d3a6d9990d4232301a7f2d26b6689fd8698ca8a30a416f
-
SSDEEP
3072:doVrT5UGhUK8k5wMpA3rlAS5BbR4W1REC:do159hUK8kxAxnJ4W1W
Static task
static1
Behavioral task
behavioral1
Sample
43534397fa68642527d6dfdf6f0aa99f40d43cfdfd6a0587cb336648e9476cb8N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
43534397fa68642527d6dfdf6f0aa99f40d43cfdfd6a0587cb336648e9476cb8N.exe
-
Size
120KB
-
MD5
fc2a1c99c4afae694c2671e8db0cd2d0
-
SHA1
1fd7ae6821e4cd048066a33c802dcb95c3ebbbe2
-
SHA256
43534397fa68642527d6dfdf6f0aa99f40d43cfdfd6a0587cb336648e9476cb8
-
SHA512
0a11653d627385d63c703e2d4c60ca89fb506e9c89db726f8e0b0a8d9a6b57340a5ce25cf8efba0218d3a6d9990d4232301a7f2d26b6689fd8698ca8a30a416f
-
SSDEEP
3072:doVrT5UGhUK8k5wMpA3rlAS5BbR4W1REC:do159hUK8kxAxnJ4W1W
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5