General
-
Target
8ae2cd73567894739f23424cb4aceadf0769372e3cce11ac652372f88aa0f95eN.exe
-
Size
120KB
-
Sample
241208-azftcsyjcl
-
MD5
1e069073f419b016eab40d926c1c7d50
-
SHA1
dd6e3aee90e1acbdaaee47a0af85fc94037de792
-
SHA256
8ae2cd73567894739f23424cb4aceadf0769372e3cce11ac652372f88aa0f95e
-
SHA512
243443d5a1b4565e7245b70d505ed827f545a54d77119330a71b6174f338eb1b3757460398532e4249221cbaba45fcb3451f1b672097798e8af3cd5d6021427d
-
SSDEEP
1536:FYzghzBopsMnx86nQpFtKqaCX2vbB0h0bqHIVQGeFqJgs4GZGL/cfpd6NjHznebg:UB9Wmq1XWb+h0bhy3wQ+ANjHje
Static task
static1
Behavioral task
behavioral1
Sample
8ae2cd73567894739f23424cb4aceadf0769372e3cce11ac652372f88aa0f95eN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8ae2cd73567894739f23424cb4aceadf0769372e3cce11ac652372f88aa0f95eN.exe
-
Size
120KB
-
MD5
1e069073f419b016eab40d926c1c7d50
-
SHA1
dd6e3aee90e1acbdaaee47a0af85fc94037de792
-
SHA256
8ae2cd73567894739f23424cb4aceadf0769372e3cce11ac652372f88aa0f95e
-
SHA512
243443d5a1b4565e7245b70d505ed827f545a54d77119330a71b6174f338eb1b3757460398532e4249221cbaba45fcb3451f1b672097798e8af3cd5d6021427d
-
SSDEEP
1536:FYzghzBopsMnx86nQpFtKqaCX2vbB0h0bqHIVQGeFqJgs4GZGL/cfpd6NjHznebg:UB9Wmq1XWb+h0bhy3wQ+ANjHje
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5