General
-
Target
3455aa7ee045bb5372768bcffbde16476501a489dfb6ce86552346c1f82cf7f0.exe
-
Size
120KB
-
Sample
241206-y26dss1pfn
-
MD5
35daebe77f7f9e5d9687fe7aa2ae10ec
-
SHA1
c55102490f8281eeca2e8fd4a0deee411f7e81b8
-
SHA256
3455aa7ee045bb5372768bcffbde16476501a489dfb6ce86552346c1f82cf7f0
-
SHA512
325ded718ca68629440b6def683438c422ed09857139d8922bda535c698397b0ad26760f361987fd61285179639d809ff7c25c19661fbe33383e477e80d57fa9
-
SSDEEP
3072:KWq52BJcoVCpyTSBTG2y5L1Nsa3eCsKsc+x:JqIjVkyTATGN5LMCFMx
Static task
static1
Behavioral task
behavioral1
Sample
3455aa7ee045bb5372768bcffbde16476501a489dfb6ce86552346c1f82cf7f0.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3455aa7ee045bb5372768bcffbde16476501a489dfb6ce86552346c1f82cf7f0.exe
-
Size
120KB
-
MD5
35daebe77f7f9e5d9687fe7aa2ae10ec
-
SHA1
c55102490f8281eeca2e8fd4a0deee411f7e81b8
-
SHA256
3455aa7ee045bb5372768bcffbde16476501a489dfb6ce86552346c1f82cf7f0
-
SHA512
325ded718ca68629440b6def683438c422ed09857139d8922bda535c698397b0ad26760f361987fd61285179639d809ff7c25c19661fbe33383e477e80d57fa9
-
SSDEEP
3072:KWq52BJcoVCpyTSBTG2y5L1Nsa3eCsKsc+x:JqIjVkyTATGN5LMCFMx
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5