General
-
Target
5f8c94e042c754e3a312ee7c38aea8937edf0b9ec34e10f49bc5686232fd152d.exe
-
Size
120KB
-
Sample
241206-vmp7gsxqez
-
MD5
e1c5631f1ba92f549b17772d6a995b54
-
SHA1
caaa56ba62143458fc465d590359fd3b4ddb1067
-
SHA256
5f8c94e042c754e3a312ee7c38aea8937edf0b9ec34e10f49bc5686232fd152d
-
SHA512
1fd1bbfbbcb50c979a30ca69f1670c240ad4c7a242e43b9dd4412816cee7a8bdf2e455e3f09d8ee07e4575b0074131f78e0b4911869538180d7fc319b92394d0
-
SSDEEP
1536:28IrE5hfDx7LhMbveVkp09k7k8VY7BMiwwHQjTPdw836Zk4xUnR5LPVNXu:28V5RpLhAWINY7BfwwHQjTVwB5evt8
Static task
static1
Behavioral task
behavioral1
Sample
5f8c94e042c754e3a312ee7c38aea8937edf0b9ec34e10f49bc5686232fd152d.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5f8c94e042c754e3a312ee7c38aea8937edf0b9ec34e10f49bc5686232fd152d.exe
-
Size
120KB
-
MD5
e1c5631f1ba92f549b17772d6a995b54
-
SHA1
caaa56ba62143458fc465d590359fd3b4ddb1067
-
SHA256
5f8c94e042c754e3a312ee7c38aea8937edf0b9ec34e10f49bc5686232fd152d
-
SHA512
1fd1bbfbbcb50c979a30ca69f1670c240ad4c7a242e43b9dd4412816cee7a8bdf2e455e3f09d8ee07e4575b0074131f78e0b4911869538180d7fc319b92394d0
-
SSDEEP
1536:28IrE5hfDx7LhMbveVkp09k7k8VY7BMiwwHQjTPdw836Zk4xUnR5LPVNXu:28V5RpLhAWINY7BfwwHQjTVwB5evt8
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5