General
-
Target
0fd52308b6159940aba52b05e6a306f6307c0a4322ab311167e3343cc012f11cN.exe
-
Size
120KB
-
Sample
241208-af6knsxjdl
-
MD5
0762a42a6bdd5d289af5c2e4aaecec50
-
SHA1
d0502fe7ffa972c8706cc80f88dc858963c38009
-
SHA256
0fd52308b6159940aba52b05e6a306f6307c0a4322ab311167e3343cc012f11c
-
SHA512
5155e316b2ef77e3fff9cf19564ff42d23552dfb58d309075e7555b99ced1cd336a94dd727f9b8a57efadec3e92ecea6eb3ed2a0c8bd17747f585222f2d28b14
-
SSDEEP
3072:X+aC68Nw2LtLG7jFi7CYaEgpuYHYmVmL:JCmSlG7jFi76puYH
Static task
static1
Behavioral task
behavioral1
Sample
0fd52308b6159940aba52b05e6a306f6307c0a4322ab311167e3343cc012f11cN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0fd52308b6159940aba52b05e6a306f6307c0a4322ab311167e3343cc012f11cN.exe
-
Size
120KB
-
MD5
0762a42a6bdd5d289af5c2e4aaecec50
-
SHA1
d0502fe7ffa972c8706cc80f88dc858963c38009
-
SHA256
0fd52308b6159940aba52b05e6a306f6307c0a4322ab311167e3343cc012f11c
-
SHA512
5155e316b2ef77e3fff9cf19564ff42d23552dfb58d309075e7555b99ced1cd336a94dd727f9b8a57efadec3e92ecea6eb3ed2a0c8bd17747f585222f2d28b14
-
SSDEEP
3072:X+aC68Nw2LtLG7jFi7CYaEgpuYHYmVmL:JCmSlG7jFi76puYH
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5