General
-
Target
420d1325486da657a7179f6ec6fd7522a444b82bf5381d3837ad06f4462addddN.exe
-
Size
120KB
-
Sample
241207-btymnaykaw
-
MD5
13a2ffb83b53ac74d0f814cc46654fd0
-
SHA1
32ce5462ef6d57d7061992e974c27e3a213dbe7f
-
SHA256
420d1325486da657a7179f6ec6fd7522a444b82bf5381d3837ad06f4462adddd
-
SHA512
35e09d0b912bd87c1c4be8573af31302f29c242460e7e870138d61efdd891f7d0a3f5c36268944bd76b568da8a9bad480a39299eabf6612b3734817e4a480268
-
SSDEEP
1536:kl6P4N51ykto3XvzGbUgXVthzcRDeKd1EGiziHIeuYNIfTkfipm:vdkQfzGYgXVthcKMStz82KIvpm
Static task
static1
Behavioral task
behavioral1
Sample
420d1325486da657a7179f6ec6fd7522a444b82bf5381d3837ad06f4462addddN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
420d1325486da657a7179f6ec6fd7522a444b82bf5381d3837ad06f4462addddN.exe
-
Size
120KB
-
MD5
13a2ffb83b53ac74d0f814cc46654fd0
-
SHA1
32ce5462ef6d57d7061992e974c27e3a213dbe7f
-
SHA256
420d1325486da657a7179f6ec6fd7522a444b82bf5381d3837ad06f4462adddd
-
SHA512
35e09d0b912bd87c1c4be8573af31302f29c242460e7e870138d61efdd891f7d0a3f5c36268944bd76b568da8a9bad480a39299eabf6612b3734817e4a480268
-
SSDEEP
1536:kl6P4N51ykto3XvzGbUgXVthzcRDeKd1EGiziHIeuYNIfTkfipm:vdkQfzGYgXVthcKMStz82KIvpm
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5