General
-
Target
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.exe
-
Size
120KB
-
Sample
241207-cf7tvazlcx
-
MD5
1ac1b855056f20a0cb8206dc8616adb0
-
SHA1
f10c28bf84296a5ef3a14f0d957afb0f2a288aca
-
SHA256
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587db
-
SHA512
6775c64a29a48d3cc8de11f403d6223c1ae30fd4e3a312cb41f5b4e2c35634fe4a36d0effeed1ea6a35f3d848635e0948b22c368e4b07b9d8460bc33804274c6
-
SSDEEP
3072:xdTlgQ9WqLOAjvHs2wa7eh++nzZudLu1Ip:xdT19LDcUdLue
Static task
static1
Behavioral task
behavioral1
Sample
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587dbN.exe
-
Size
120KB
-
MD5
1ac1b855056f20a0cb8206dc8616adb0
-
SHA1
f10c28bf84296a5ef3a14f0d957afb0f2a288aca
-
SHA256
e80405ef16edc0ea6db2f3d96e24f8907506f7dec26e7bcfba0e4c31e65587db
-
SHA512
6775c64a29a48d3cc8de11f403d6223c1ae30fd4e3a312cb41f5b4e2c35634fe4a36d0effeed1ea6a35f3d848635e0948b22c368e4b07b9d8460bc33804274c6
-
SSDEEP
3072:xdTlgQ9WqLOAjvHs2wa7eh++nzZudLu1Ip:xdT19LDcUdLue
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5