General
-
Target
40d3928352ff0192748e8a718c88a18207c2cd19f5998189e00c58b2e22e4e2e.exe
-
Size
120KB
-
Sample
241206-szqbxatrdx
-
MD5
363c070ae1c6295a8bed9950bbeccdbe
-
SHA1
e6b6d1859f06cd3a8284678d0b713173c241ee26
-
SHA256
40d3928352ff0192748e8a718c88a18207c2cd19f5998189e00c58b2e22e4e2e
-
SHA512
921b2e4559cdb4c9be12b6fdd7dfe68110fbcb469ea872929e8bf5da6621115259f06f9aa1ca38e0963f54e9e9916fefad27dbff7a4f53f470d7eb59eac5d7af
-
SSDEEP
3072:xvvH3aqslQBQSwgZlGFRHnATB4h8ujW2P3bk8:xvf3fxBQhgjGFNnAT68uy2P3bk8
Static task
static1
Behavioral task
behavioral1
Sample
40d3928352ff0192748e8a718c88a18207c2cd19f5998189e00c58b2e22e4e2e.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
40d3928352ff0192748e8a718c88a18207c2cd19f5998189e00c58b2e22e4e2e.exe
-
Size
120KB
-
MD5
363c070ae1c6295a8bed9950bbeccdbe
-
SHA1
e6b6d1859f06cd3a8284678d0b713173c241ee26
-
SHA256
40d3928352ff0192748e8a718c88a18207c2cd19f5998189e00c58b2e22e4e2e
-
SHA512
921b2e4559cdb4c9be12b6fdd7dfe68110fbcb469ea872929e8bf5da6621115259f06f9aa1ca38e0963f54e9e9916fefad27dbff7a4f53f470d7eb59eac5d7af
-
SSDEEP
3072:xvvH3aqslQBQSwgZlGFRHnATB4h8ujW2P3bk8:xvf3fxBQhgjGFNnAT68uy2P3bk8
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5