General
-
Target
0d37c2a7619f1512805b7e71edec7c878a32bf92b56a1765fde0fb8828d8ffb5.exe
-
Size
120KB
-
Sample
241207-jwydnstlay
-
MD5
b3914a3d09c4d9e22308bd8062bfe255
-
SHA1
a706948525b7482acb32f345f953a98647e4d4e3
-
SHA256
0d37c2a7619f1512805b7e71edec7c878a32bf92b56a1765fde0fb8828d8ffb5
-
SHA512
d90d5d3b7be59ef4c53a5c3be6366c72b42c8e6db94017d97bcf350dd9b486cdc570a1ac13f8aa00eef98b5d1fe23a7e0fbada5b6f8b1980a28ca57f72940326
-
SSDEEP
1536:EITNtKIzYgpNAGvd+khIV2p2ghQQM1ROaf68BU4Bj/PwyYO4Xd2oMlFig9M:p3KepZvAkhS2ptiLf68BPj/IOK2hD9M
Static task
static1
Behavioral task
behavioral1
Sample
0d37c2a7619f1512805b7e71edec7c878a32bf92b56a1765fde0fb8828d8ffb5.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0d37c2a7619f1512805b7e71edec7c878a32bf92b56a1765fde0fb8828d8ffb5.exe
-
Size
120KB
-
MD5
b3914a3d09c4d9e22308bd8062bfe255
-
SHA1
a706948525b7482acb32f345f953a98647e4d4e3
-
SHA256
0d37c2a7619f1512805b7e71edec7c878a32bf92b56a1765fde0fb8828d8ffb5
-
SHA512
d90d5d3b7be59ef4c53a5c3be6366c72b42c8e6db94017d97bcf350dd9b486cdc570a1ac13f8aa00eef98b5d1fe23a7e0fbada5b6f8b1980a28ca57f72940326
-
SSDEEP
1536:EITNtKIzYgpNAGvd+khIV2p2ghQQM1ROaf68BU4Bj/PwyYO4Xd2oMlFig9M:p3KepZvAkhS2ptiLf68BPj/IOK2hD9M
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5