General
-
Target
f480f058d4d9ad071d5d9a645eb4825afb2466cb150e2e23fc44a7343914d3f7.exe
-
Size
120KB
-
Sample
241207-myc3asvmdq
-
MD5
0f672c137e00e60ba7c5f52b3e62314c
-
SHA1
51b36d8e8f2ae222d4fece8aa12d0d93fcb8ec28
-
SHA256
f480f058d4d9ad071d5d9a645eb4825afb2466cb150e2e23fc44a7343914d3f7
-
SHA512
56c05882533c6a83aac98d512865c28c24b78d5e93bd456272570733880d68e3c9718690aba80c06b0810186225696fb37b604fabd949d87be19d971f7c06ab7
-
SSDEEP
3072:N3Paxzh0bQ5Hv6qhiKY7hZC7ZIXThDC8emK8L:NKt0mw77nCCDNe4
Static task
static1
Behavioral task
behavioral1
Sample
f480f058d4d9ad071d5d9a645eb4825afb2466cb150e2e23fc44a7343914d3f7.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f480f058d4d9ad071d5d9a645eb4825afb2466cb150e2e23fc44a7343914d3f7.exe
-
Size
120KB
-
MD5
0f672c137e00e60ba7c5f52b3e62314c
-
SHA1
51b36d8e8f2ae222d4fece8aa12d0d93fcb8ec28
-
SHA256
f480f058d4d9ad071d5d9a645eb4825afb2466cb150e2e23fc44a7343914d3f7
-
SHA512
56c05882533c6a83aac98d512865c28c24b78d5e93bd456272570733880d68e3c9718690aba80c06b0810186225696fb37b604fabd949d87be19d971f7c06ab7
-
SSDEEP
3072:N3Paxzh0bQ5Hv6qhiKY7hZC7ZIXThDC8emK8L:NKt0mw77nCCDNe4
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5