General
-
Target
8a1d9453a2b5be8cafdb5681d9ac7f1ca820a61157f86c8449044db74ea62d91.exe
-
Size
120KB
-
Sample
241207-aa9eda1lbk
-
MD5
ab99607e03e7bb77b34e6c17653200f5
-
SHA1
bfb4af4026d10620c6f70e397237d9bf57075930
-
SHA256
8a1d9453a2b5be8cafdb5681d9ac7f1ca820a61157f86c8449044db74ea62d91
-
SHA512
804be220baf6cd0d83fa3243ca92accbae29c13f7a7f8eb46bba6a5664b80607c5e922342b629dd03a5fec1c3e5ac84446dec37b9523f4e5b538046309fdf18e
-
SSDEEP
3072:79MvdYipneTiQ85dkWH3xWD2EP+ED40zNF:w1deTXY+AxWHzb
Static task
static1
Behavioral task
behavioral1
Sample
8a1d9453a2b5be8cafdb5681d9ac7f1ca820a61157f86c8449044db74ea62d91.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8a1d9453a2b5be8cafdb5681d9ac7f1ca820a61157f86c8449044db74ea62d91.exe
-
Size
120KB
-
MD5
ab99607e03e7bb77b34e6c17653200f5
-
SHA1
bfb4af4026d10620c6f70e397237d9bf57075930
-
SHA256
8a1d9453a2b5be8cafdb5681d9ac7f1ca820a61157f86c8449044db74ea62d91
-
SHA512
804be220baf6cd0d83fa3243ca92accbae29c13f7a7f8eb46bba6a5664b80607c5e922342b629dd03a5fec1c3e5ac84446dec37b9523f4e5b538046309fdf18e
-
SSDEEP
3072:79MvdYipneTiQ85dkWH3xWD2EP+ED40zNF:w1deTXY+AxWHzb
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5