General
-
Target
5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1N.exe
-
Size
120KB
-
Sample
241206-rqlrpa1qb1
-
MD5
4b0e577bba05ec5cda5bc78c29c8b430
-
SHA1
0b5e215668b81a0b6014ed504cd415b3a193c03d
-
SHA256
5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1
-
SHA512
449450d06cf20c773d99a0f2bb87a1ec45212378cc6692632e997474c2f488537b68fdac3c89eba4b658675eff3600a954bff72586da37167f0cfb829dd37d55
-
SSDEEP
3072:MMrRcAV7RvOT1Y2QJj5rnxJwrlcjKhrwWb:P6AFRmxYFJxgZcjPq
Static task
static1
Behavioral task
behavioral1
Sample
5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1N.exe
-
Size
120KB
-
MD5
4b0e577bba05ec5cda5bc78c29c8b430
-
SHA1
0b5e215668b81a0b6014ed504cd415b3a193c03d
-
SHA256
5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1
-
SHA512
449450d06cf20c773d99a0f2bb87a1ec45212378cc6692632e997474c2f488537b68fdac3c89eba4b658675eff3600a954bff72586da37167f0cfb829dd37d55
-
SSDEEP
3072:MMrRcAV7RvOT1Y2QJj5rnxJwrlcjKhrwWb:P6AFRmxYFJxgZcjPq
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5