General
-
Target
a56969646b7a8744f0bef094e438ab1fec869d625cc29a3618df79d80acf4dbdN.exe
-
Size
120KB
-
Sample
241207-h7qyasskhv
-
MD5
3cbe82c3bfa943c58f8436e3e7e9e040
-
SHA1
7cd5f20a29d730435f2fa848e275a319f7420921
-
SHA256
a56969646b7a8744f0bef094e438ab1fec869d625cc29a3618df79d80acf4dbd
-
SHA512
d5d43457a527700450b59de2b66ec6cf4ed2ec010ba6df9b7ab2686628f70f10615901dcaeb85f5425e67ab5061dcaa3d3e2ea9e5d9da887b2fd1f4c6ecc3b88
-
SSDEEP
3072:Ml18ay96IKU0EWjJYFoYVupVLuY7wWSdSRhzj5H9CO5DAHPxQ:W1H1I/oFYOYMDwWSdSTn5dC5vxQ
Static task
static1
Behavioral task
behavioral1
Sample
a56969646b7a8744f0bef094e438ab1fec869d625cc29a3618df79d80acf4dbdN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a56969646b7a8744f0bef094e438ab1fec869d625cc29a3618df79d80acf4dbdN.exe
-
Size
120KB
-
MD5
3cbe82c3bfa943c58f8436e3e7e9e040
-
SHA1
7cd5f20a29d730435f2fa848e275a319f7420921
-
SHA256
a56969646b7a8744f0bef094e438ab1fec869d625cc29a3618df79d80acf4dbd
-
SHA512
d5d43457a527700450b59de2b66ec6cf4ed2ec010ba6df9b7ab2686628f70f10615901dcaeb85f5425e67ab5061dcaa3d3e2ea9e5d9da887b2fd1f4c6ecc3b88
-
SSDEEP
3072:Ml18ay96IKU0EWjJYFoYVupVLuY7wWSdSRhzj5H9CO5DAHPxQ:W1H1I/oFYOYMDwWSdSTn5dC5vxQ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5