General
-
Target
d2404a2d29ba0ba5fc4117535ae0fc238272995cb75ca3a3c77d83c2436f1144N.exe
-
Size
120KB
-
Sample
241207-eacgvstrhs
-
MD5
dae0c393d38bfb64c0f03c31d3bb0010
-
SHA1
2d36ff93b91ac38490904998bbe9b4d9f7f6abf5
-
SHA256
d2404a2d29ba0ba5fc4117535ae0fc238272995cb75ca3a3c77d83c2436f1144
-
SHA512
e957e3754fade47f59e50e8d2da7e733d431cfdd69d7b0469ad6717bbb4f1491aea48a7d0449fbed505353b1b4f8b2c7eaf38425d7d775fdaa9e269602a2ce4e
-
SSDEEP
3072:R8qKXN25xs7Xzu3smw34bjsaYTKF2az3:CTXQbs7Du3O3MDkkz3
Static task
static1
Behavioral task
behavioral1
Sample
d2404a2d29ba0ba5fc4117535ae0fc238272995cb75ca3a3c77d83c2436f1144N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d2404a2d29ba0ba5fc4117535ae0fc238272995cb75ca3a3c77d83c2436f1144N.exe
-
Size
120KB
-
MD5
dae0c393d38bfb64c0f03c31d3bb0010
-
SHA1
2d36ff93b91ac38490904998bbe9b4d9f7f6abf5
-
SHA256
d2404a2d29ba0ba5fc4117535ae0fc238272995cb75ca3a3c77d83c2436f1144
-
SHA512
e957e3754fade47f59e50e8d2da7e733d431cfdd69d7b0469ad6717bbb4f1491aea48a7d0449fbed505353b1b4f8b2c7eaf38425d7d775fdaa9e269602a2ce4e
-
SSDEEP
3072:R8qKXN25xs7Xzu3smw34bjsaYTKF2az3:CTXQbs7Du3O3MDkkz3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5