General
-
Target
777c00afba7b939982e9269f204b8cd450f794935904ac69386c36bd745038dfN.exe
-
Size
120KB
-
Sample
241207-mdn9tstnfl
-
MD5
fa1b6b3c9b1d06f4143447a4c8b4a230
-
SHA1
19ce63eeb7b2d0093c953b66a5eac46804884788
-
SHA256
777c00afba7b939982e9269f204b8cd450f794935904ac69386c36bd745038df
-
SHA512
23a44c58e00b438d5569a3fecbfbf216eef637b31e68febfc1d4c08b701d9a94fefd5e9bfc126692efd0a0b924ad9172ce0cb8f3d0e9ea25a54ca634bef92b8e
-
SSDEEP
3072:pzjgz067GF8yGkeJ8NJ7Uu1h9sdVisxztxVctV0:uBkprH1h9sd0sxztM
Static task
static1
Behavioral task
behavioral1
Sample
777c00afba7b939982e9269f204b8cd450f794935904ac69386c36bd745038dfN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
777c00afba7b939982e9269f204b8cd450f794935904ac69386c36bd745038dfN.exe
-
Size
120KB
-
MD5
fa1b6b3c9b1d06f4143447a4c8b4a230
-
SHA1
19ce63eeb7b2d0093c953b66a5eac46804884788
-
SHA256
777c00afba7b939982e9269f204b8cd450f794935904ac69386c36bd745038df
-
SHA512
23a44c58e00b438d5569a3fecbfbf216eef637b31e68febfc1d4c08b701d9a94fefd5e9bfc126692efd0a0b924ad9172ce0cb8f3d0e9ea25a54ca634bef92b8e
-
SSDEEP
3072:pzjgz067GF8yGkeJ8NJ7Uu1h9sdVisxztxVctV0:uBkprH1h9sd0sxztM
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5