General
-
Target
cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b.exe
-
Size
120KB
-
Sample
241207-hqzh4s1ndy
-
MD5
e3488bf60c8cb3c6118fc1fabcc7c038
-
SHA1
8df03900becfabcaaae1527e40604bddb16b10c6
-
SHA256
cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b
-
SHA512
b027aa550992f61d8d05dc8b411b9675daa55114951ddebb257dc78a48cfc27048c21bd4ec1f33b6cca7818d571c2840ab1a0ff45f7d27876f948762516e89ce
-
SSDEEP
3072:5+B2XKzarj38plpyW0RACoH3cR6FyJD/d:5+6rD8plpyLRAbH3ccF6
Static task
static1
Behavioral task
behavioral1
Sample
cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b.exe
-
Size
120KB
-
MD5
e3488bf60c8cb3c6118fc1fabcc7c038
-
SHA1
8df03900becfabcaaae1527e40604bddb16b10c6
-
SHA256
cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b
-
SHA512
b027aa550992f61d8d05dc8b411b9675daa55114951ddebb257dc78a48cfc27048c21bd4ec1f33b6cca7818d571c2840ab1a0ff45f7d27876f948762516e89ce
-
SSDEEP
3072:5+B2XKzarj38plpyW0RACoH3cR6FyJD/d:5+6rD8plpyLRAbH3ccF6
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5