General
-
Target
2df2e82a9519f271844fdce23289fead2c77dd0e98ef1007c188a73f1b20e9c7.exe
-
Size
120KB
-
Sample
241207-m2ltlszkg1
-
MD5
8a8acb2d9d035198c999d2026bb28cda
-
SHA1
e5efa9ac3ccb328756c8ff5c421df757564ee377
-
SHA256
2df2e82a9519f271844fdce23289fead2c77dd0e98ef1007c188a73f1b20e9c7
-
SHA512
5af54b080a38c4fb50763b6d8ae58bfcd7fe9ba50e4f2b7abac1bb7e1c79c6bacba1da67e81a2e3a18d71f8a691aac21f8c49623ce5b848cbd2a5b426a429869
-
SSDEEP
3072:xOaU4gT6omZjkc+gnzdQaWx7VZLXjNo03+NNT2Qp:xX66rnnzdQvRZLXjr3CT2Qp
Static task
static1
Behavioral task
behavioral1
Sample
2df2e82a9519f271844fdce23289fead2c77dd0e98ef1007c188a73f1b20e9c7.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2df2e82a9519f271844fdce23289fead2c77dd0e98ef1007c188a73f1b20e9c7.exe
-
Size
120KB
-
MD5
8a8acb2d9d035198c999d2026bb28cda
-
SHA1
e5efa9ac3ccb328756c8ff5c421df757564ee377
-
SHA256
2df2e82a9519f271844fdce23289fead2c77dd0e98ef1007c188a73f1b20e9c7
-
SHA512
5af54b080a38c4fb50763b6d8ae58bfcd7fe9ba50e4f2b7abac1bb7e1c79c6bacba1da67e81a2e3a18d71f8a691aac21f8c49623ce5b848cbd2a5b426a429869
-
SSDEEP
3072:xOaU4gT6omZjkc+gnzdQaWx7VZLXjNo03+NNT2Qp:xX66rnnzdQvRZLXjr3CT2Qp
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5