General
-
Target
50e81915cf5a245cb214c0a15adf7ee4b9375c7f70098fce221ca1f455743c05N.exe
-
Size
120KB
-
Sample
241207-gn7w2avndm
-
MD5
eb213455d732d31800833bf0d44aa930
-
SHA1
9b2f49900707aa129ba4fbd1bad1f503cbc47d12
-
SHA256
50e81915cf5a245cb214c0a15adf7ee4b9375c7f70098fce221ca1f455743c05
-
SHA512
0299d4f60d21987ecc9c21b421b7de104e432f69ee20b48190e1c2e8cf9e98a79cfd531360723fd0d0048e30284ab2a3b57f4b816ea3cb8a607065717a2676f6
-
SSDEEP
3072:Q1+Qj5JrW9akqLzSnEedTbvllH79FQ0kOrHIvQ:AqQLzSEeRbvDHRFQ0k6
Static task
static1
Behavioral task
behavioral1
Sample
50e81915cf5a245cb214c0a15adf7ee4b9375c7f70098fce221ca1f455743c05N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
50e81915cf5a245cb214c0a15adf7ee4b9375c7f70098fce221ca1f455743c05N.exe
-
Size
120KB
-
MD5
eb213455d732d31800833bf0d44aa930
-
SHA1
9b2f49900707aa129ba4fbd1bad1f503cbc47d12
-
SHA256
50e81915cf5a245cb214c0a15adf7ee4b9375c7f70098fce221ca1f455743c05
-
SHA512
0299d4f60d21987ecc9c21b421b7de104e432f69ee20b48190e1c2e8cf9e98a79cfd531360723fd0d0048e30284ab2a3b57f4b816ea3cb8a607065717a2676f6
-
SSDEEP
3072:Q1+Qj5JrW9akqLzSnEedTbvllH79FQ0kOrHIvQ:AqQLzSEeRbvDHRFQ0k6
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5