General
-
Target
95eb04399fca67538cec37e2b6825a401fc162e95603cc5386636cad03be52f4N.exe
-
Size
120KB
-
Sample
241207-g22beazmhw
-
MD5
0817598016531694a0b4d9312ec507d0
-
SHA1
14ea392eb04bcfcc167d36da93bb70f0ebe189b2
-
SHA256
95eb04399fca67538cec37e2b6825a401fc162e95603cc5386636cad03be52f4
-
SHA512
e3893ac5c4ecdc2c137387e2afe37657554aadc51d3f2d410a16db823a66313a4b58c5da83945b7a3e04e5d0dac143dbff7231b7fdfe517e34d9fbb7c96cc736
-
SSDEEP
1536:CV2KzKqk0dKamvi6DSRujPOkyVX2A2jj5S1u8voByGoeAXdEXh1bzVEyaWgZcY:CV2yaamKgFOAj5SYUZDNCh1HGyiiY
Static task
static1
Behavioral task
behavioral1
Sample
95eb04399fca67538cec37e2b6825a401fc162e95603cc5386636cad03be52f4N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
95eb04399fca67538cec37e2b6825a401fc162e95603cc5386636cad03be52f4N.exe
-
Size
120KB
-
MD5
0817598016531694a0b4d9312ec507d0
-
SHA1
14ea392eb04bcfcc167d36da93bb70f0ebe189b2
-
SHA256
95eb04399fca67538cec37e2b6825a401fc162e95603cc5386636cad03be52f4
-
SHA512
e3893ac5c4ecdc2c137387e2afe37657554aadc51d3f2d410a16db823a66313a4b58c5da83945b7a3e04e5d0dac143dbff7231b7fdfe517e34d9fbb7c96cc736
-
SSDEEP
1536:CV2KzKqk0dKamvi6DSRujPOkyVX2A2jj5S1u8voByGoeAXdEXh1bzVEyaWgZcY:CV2yaamKgFOAj5SYUZDNCh1HGyiiY
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5