General
-
Target
e736fd18752eaf1d21cbb2b408755239106d0324b481bcc33a8d6ab8635b18e3N.exe
-
Size
120KB
-
Sample
241207-1ljk7svpg1
-
MD5
cafbc00b1b6e85ede833216bef91b650
-
SHA1
ffe6c88cc7a5e02a558be485758cf944a288a7b2
-
SHA256
e736fd18752eaf1d21cbb2b408755239106d0324b481bcc33a8d6ab8635b18e3
-
SHA512
fca18abff8fc6296e907a4b6071bf2fc9c7d00eb8583c19750cd27809beb743ec28ae24a9c67044cc5a53b219096d6fe1a8caadf5555e54fcca00a3f712a3659
-
SSDEEP
1536:aWy5q3OQsNw5HSwCWz2WklxYrBGDra43xgcHKkIzZaTHTk:Vyge9NPwCWqWklx+GDG43xnHPIzezk
Static task
static1
Behavioral task
behavioral1
Sample
e736fd18752eaf1d21cbb2b408755239106d0324b481bcc33a8d6ab8635b18e3N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e736fd18752eaf1d21cbb2b408755239106d0324b481bcc33a8d6ab8635b18e3N.exe
-
Size
120KB
-
MD5
cafbc00b1b6e85ede833216bef91b650
-
SHA1
ffe6c88cc7a5e02a558be485758cf944a288a7b2
-
SHA256
e736fd18752eaf1d21cbb2b408755239106d0324b481bcc33a8d6ab8635b18e3
-
SHA512
fca18abff8fc6296e907a4b6071bf2fc9c7d00eb8583c19750cd27809beb743ec28ae24a9c67044cc5a53b219096d6fe1a8caadf5555e54fcca00a3f712a3659
-
SSDEEP
1536:aWy5q3OQsNw5HSwCWz2WklxYrBGDra43xgcHKkIzZaTHTk:Vyge9NPwCWqWklx+GDG43xnHPIzezk
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5