General
-
Target
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.exe
-
Size
120KB
-
Sample
241207-e5ekpssker
-
MD5
88622bd3eff75a907b5c9cc4f71cfa08
-
SHA1
7bbc9f785560b28a9e00bc8a97fab2af8452fee5
-
SHA256
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5
-
SHA512
f25daeab790751b5ddf6707b3194b6fd652dd544ed5cb71815a832403305426c4ceee7bc43f25a9a8b18cbd131f4f6449eb9cc3b71a9ae6113b38bda3efaa974
-
SSDEEP
1536:o29KEEppnoQGJ4SAbIRch6CFuArYcCDXBpIF/LOugRtOwAyG+52hyr/lJ1KM9:MEEjoNJ44ch6gueCDXDugRbvYhyBJ1H9
Static task
static1
Behavioral task
behavioral1
Sample
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5.exe
-
Size
120KB
-
MD5
88622bd3eff75a907b5c9cc4f71cfa08
-
SHA1
7bbc9f785560b28a9e00bc8a97fab2af8452fee5
-
SHA256
7df2f15c74913a715f788512528faa53f5ae4214aa70f68198d407f172e7c0d5
-
SHA512
f25daeab790751b5ddf6707b3194b6fd652dd544ed5cb71815a832403305426c4ceee7bc43f25a9a8b18cbd131f4f6449eb9cc3b71a9ae6113b38bda3efaa974
-
SSDEEP
1536:o29KEEppnoQGJ4SAbIRch6CFuArYcCDXBpIF/LOugRtOwAyG+52hyr/lJ1KM9:MEEjoNJ44ch6gueCDXDugRbvYhyBJ1H9
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5