General
-
Target
5d7ccb3e4653ef4434441a41be6f11a87e3d9d50788cb6ae63af1e53ab9b7f2eN.exe
-
Size
120KB
-
Sample
241207-krhyvsvmhs
-
MD5
6e071bbfe9a011fd5c3c70b969ec1420
-
SHA1
f62af8466e7701d06fdc89d2fc97d10ee3f60b33
-
SHA256
5d7ccb3e4653ef4434441a41be6f11a87e3d9d50788cb6ae63af1e53ab9b7f2e
-
SHA512
2efeac7e6987ac35c24cadf21293747e416c36f94f72eaaca6ddf98cb507fc6c44fa4dd0e6efaa56ebd1da7065e642de4dc3c9e8696a4c3dd399a611ec7b3f34
-
SSDEEP
1536:OtWQ3n03BhX5FgJXDjpugv/A8YDuSVOiH/c1TA67j3P3KIokWimi2wdMsESP+XNO:ugHCzjpu8o8I/crvKbkWkUsESP+X
Static task
static1
Behavioral task
behavioral1
Sample
5d7ccb3e4653ef4434441a41be6f11a87e3d9d50788cb6ae63af1e53ab9b7f2eN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5d7ccb3e4653ef4434441a41be6f11a87e3d9d50788cb6ae63af1e53ab9b7f2eN.exe
-
Size
120KB
-
MD5
6e071bbfe9a011fd5c3c70b969ec1420
-
SHA1
f62af8466e7701d06fdc89d2fc97d10ee3f60b33
-
SHA256
5d7ccb3e4653ef4434441a41be6f11a87e3d9d50788cb6ae63af1e53ab9b7f2e
-
SHA512
2efeac7e6987ac35c24cadf21293747e416c36f94f72eaaca6ddf98cb507fc6c44fa4dd0e6efaa56ebd1da7065e642de4dc3c9e8696a4c3dd399a611ec7b3f34
-
SSDEEP
1536:OtWQ3n03BhX5FgJXDjpugv/A8YDuSVOiH/c1TA67j3P3KIokWimi2wdMsESP+XNO:ugHCzjpu8o8I/crvKbkWkUsESP+X
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5