General
-
Target
c77374f0a191fb3e6aa32ea4e5c4ce7fe46424b226e843833c43e4974994c888N.exe
-
Size
120KB
-
Sample
241207-aaaaaa1kgl
-
MD5
98b63c99cc682f0f238af51920bd42b0
-
SHA1
2e16d1bbef0346a76b84aa1d533accc51d9f25d5
-
SHA256
c77374f0a191fb3e6aa32ea4e5c4ce7fe46424b226e843833c43e4974994c888
-
SHA512
6120ed94d3f1b4a98d5e1867a8d3c1dac21f37ef6bd1626ddd9604dd00c8cf3a7afc2cfd95ad115e0a6fb3837a23d389a51ea97d2d130c380642741e4bb3411a
-
SSDEEP
1536:Wwxm+3gQzMGFjvLkBm9sdBYwM8X8jVQLtYS1umyVXS9HQdXgmcm5:Jx3ljvV9sdSq8jVQLOUyVXSJQdXwm5
Static task
static1
Behavioral task
behavioral1
Sample
c77374f0a191fb3e6aa32ea4e5c4ce7fe46424b226e843833c43e4974994c888N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c77374f0a191fb3e6aa32ea4e5c4ce7fe46424b226e843833c43e4974994c888N.exe
-
Size
120KB
-
MD5
98b63c99cc682f0f238af51920bd42b0
-
SHA1
2e16d1bbef0346a76b84aa1d533accc51d9f25d5
-
SHA256
c77374f0a191fb3e6aa32ea4e5c4ce7fe46424b226e843833c43e4974994c888
-
SHA512
6120ed94d3f1b4a98d5e1867a8d3c1dac21f37ef6bd1626ddd9604dd00c8cf3a7afc2cfd95ad115e0a6fb3837a23d389a51ea97d2d130c380642741e4bb3411a
-
SSDEEP
1536:Wwxm+3gQzMGFjvLkBm9sdBYwM8X8jVQLtYS1umyVXS9HQdXgmcm5:Jx3ljvV9sdSq8jVQLOUyVXSJQdXwm5
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5