General
-
Target
5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7caN.exe
-
Size
2.5MB
-
Sample
241208-dysnbavpcq
-
MD5
5c7a6e3cb62a92b237a79b4c65680af0
-
SHA1
1f762b727aebe8abf5245f87b0070a6b5fbc7410
-
SHA256
5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7ca
-
SHA512
6d786910dfd6a40bdb81699caaa42cf4be0664dc67ea07bc5740885084355b8f86d81ef50c8785687a2570664aa7278515e410a324ad0120f732ac76f541a944
-
SSDEEP
49152:gKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTz:hrZ23AbsK6Ro022JjL2WEiVqJZz
Static task
static1
Behavioral task
behavioral1
Sample
5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7caN.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7caN.exe
-
Size
2.5MB
-
MD5
5c7a6e3cb62a92b237a79b4c65680af0
-
SHA1
1f762b727aebe8abf5245f87b0070a6b5fbc7410
-
SHA256
5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7ca
-
SHA512
6d786910dfd6a40bdb81699caaa42cf4be0664dc67ea07bc5740885084355b8f86d81ef50c8785687a2570664aa7278515e410a324ad0120f732ac76f541a944
-
SSDEEP
49152:gKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTz:hrZ23AbsK6Ro022JjL2WEiVqJZz
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5