General
-
Target
24a3f30854d06886c9ebaa0eda8b8f1100c9e7652abd76a5e912020e0867de90N.exe
-
Size
120KB
-
Sample
241210-16atss1rg1
-
MD5
67d894fb922a8e4b0060d8cf57b48aa0
-
SHA1
ebec197b12651f6e18079866e5157163adcdec69
-
SHA256
24a3f30854d06886c9ebaa0eda8b8f1100c9e7652abd76a5e912020e0867de90
-
SHA512
607851de6d9294ac261f5a6a9aa72ec7aedc42056c97ee4c767392ce6912d7cd37e921aa1a15689c726e6ffe5341245ff657248bc9693fb2cb3dc49c2ffbc3eb
-
SSDEEP
3072:B53XHzYwtgP+BXITX17SjgtmA+ebJAaxG7Dbu5:nYiNG1qqtBwXe
Static task
static1
Behavioral task
behavioral1
Sample
24a3f30854d06886c9ebaa0eda8b8f1100c9e7652abd76a5e912020e0867de90N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
24a3f30854d06886c9ebaa0eda8b8f1100c9e7652abd76a5e912020e0867de90N.exe
-
Size
120KB
-
MD5
67d894fb922a8e4b0060d8cf57b48aa0
-
SHA1
ebec197b12651f6e18079866e5157163adcdec69
-
SHA256
24a3f30854d06886c9ebaa0eda8b8f1100c9e7652abd76a5e912020e0867de90
-
SHA512
607851de6d9294ac261f5a6a9aa72ec7aedc42056c97ee4c767392ce6912d7cd37e921aa1a15689c726e6ffe5341245ff657248bc9693fb2cb3dc49c2ffbc3eb
-
SSDEEP
3072:B53XHzYwtgP+BXITX17SjgtmA+ebJAaxG7Dbu5:nYiNG1qqtBwXe
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5