General
-
Target
fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66afN.exe
-
Size
120KB
-
Sample
241207-lyvfxasrcm
-
MD5
31b8a071a2c376b42d20e2c8ef553300
-
SHA1
4bc352e32127de1c335d5ad7d05e9ea5ce562c71
-
SHA256
fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66af
-
SHA512
f9d3620de62e48d5480bd0393bbe851af2e4950b123970bad5cc1cf92938bea499d015a407b0f2e0f22e8e4dadcf0415191fd5a45acc682c67d7219f0636115d
-
SSDEEP
1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLL:xaXZ0weDQZt/zWRmfGbv3+e7FLL
Static task
static1
Behavioral task
behavioral1
Sample
fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66afN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66afN.exe
-
Size
120KB
-
MD5
31b8a071a2c376b42d20e2c8ef553300
-
SHA1
4bc352e32127de1c335d5ad7d05e9ea5ce562c71
-
SHA256
fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66af
-
SHA512
f9d3620de62e48d5480bd0393bbe851af2e4950b123970bad5cc1cf92938bea499d015a407b0f2e0f22e8e4dadcf0415191fd5a45acc682c67d7219f0636115d
-
SSDEEP
1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLL:xaXZ0weDQZt/zWRmfGbv3+e7FLL
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5