General
-
Target
9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abeN.exe
-
Size
2.5MB
-
Sample
241208-e1slrssnet
-
MD5
f476d1aa1061ed5e0ad33096fecd56e0
-
SHA1
d48875c158382425310cc5ca19d5090037134314
-
SHA256
9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abe
-
SHA512
2fe052dcdbbc5a76390f5f613c9fd8139ffc6cba5c921cafad40f7212dd12f5487e1b06424ce34beb769cd9ea99774db4c3dc2049fa0ab4ab89a0bd792bff2aa
-
SSDEEP
49152:ZKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTnn:arZ23AbsK6Ro022JjL2WEiVqJZn
Static task
static1
Behavioral task
behavioral1
Sample
9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abeN.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abeN.exe
-
Size
2.5MB
-
MD5
f476d1aa1061ed5e0ad33096fecd56e0
-
SHA1
d48875c158382425310cc5ca19d5090037134314
-
SHA256
9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abe
-
SHA512
2fe052dcdbbc5a76390f5f613c9fd8139ffc6cba5c921cafad40f7212dd12f5487e1b06424ce34beb769cd9ea99774db4c3dc2049fa0ab4ab89a0bd792bff2aa
-
SSDEEP
49152:ZKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTnn:arZ23AbsK6Ro022JjL2WEiVqJZn
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5