General
-
Target
98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39.exe
-
Size
120KB
-
Sample
241207-j8d6katqaw
-
MD5
b8f8937c4c29ddde7d481292ae5b0b49
-
SHA1
e68a4f7beeb3ce26f88d32252e49687364a368b1
-
SHA256
98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39
-
SHA512
5ede285c19f6ae89a6bce0eb0e8c2f2d52c3025dbae52ece1c1e98cbabd79ac695b9c0f1a14c70e76551cd0138a3dc4cae74db84646f55e4fd5f25b104a8a76d
-
SSDEEP
1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLLu:xaXZ0weDQZt/zWRmfGbv3+e7FLLu
Static task
static1
Behavioral task
behavioral1
Sample
98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39.exe
-
Size
120KB
-
MD5
b8f8937c4c29ddde7d481292ae5b0b49
-
SHA1
e68a4f7beeb3ce26f88d32252e49687364a368b1
-
SHA256
98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39
-
SHA512
5ede285c19f6ae89a6bce0eb0e8c2f2d52c3025dbae52ece1c1e98cbabd79ac695b9c0f1a14c70e76551cd0138a3dc4cae74db84646f55e4fd5f25b104a8a76d
-
SSDEEP
1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLLu:xaXZ0weDQZt/zWRmfGbv3+e7FLLu
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5