General
-
Target
a19006698c5ba025a6dc155b3738ba2616fe50692dc96de8984d68fb8e38cd7eN.exe
-
Size
120KB
-
Sample
241210-26hp3stqgx
-
MD5
99b348c619b4698238fa89e1f3fabad0
-
SHA1
f1cfc5816595c0afacab7aeb353734a94018c372
-
SHA256
a19006698c5ba025a6dc155b3738ba2616fe50692dc96de8984d68fb8e38cd7e
-
SHA512
f6ef0b14c11592ff38619fe9c70fc21b2e6ba9ed574b9c3eb6a771ebc7dcd3fdde3ee85d09cacb70f216cd1c64de0b5fef3a45bc80f20bebcb572b43a976517c
-
SSDEEP
3072:Z5Bll+AaOozzyXp58QM7RTYucpECyddayRqjU1GFiiq9b:jBGp8CQM7xYtErwyc5q9b
Static task
static1
Behavioral task
behavioral1
Sample
a19006698c5ba025a6dc155b3738ba2616fe50692dc96de8984d68fb8e38cd7eN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a19006698c5ba025a6dc155b3738ba2616fe50692dc96de8984d68fb8e38cd7eN.exe
-
Size
120KB
-
MD5
99b348c619b4698238fa89e1f3fabad0
-
SHA1
f1cfc5816595c0afacab7aeb353734a94018c372
-
SHA256
a19006698c5ba025a6dc155b3738ba2616fe50692dc96de8984d68fb8e38cd7e
-
SHA512
f6ef0b14c11592ff38619fe9c70fc21b2e6ba9ed574b9c3eb6a771ebc7dcd3fdde3ee85d09cacb70f216cd1c64de0b5fef3a45bc80f20bebcb572b43a976517c
-
SSDEEP
3072:Z5Bll+AaOozzyXp58QM7RTYucpECyddayRqjU1GFiiq9b:jBGp8CQM7xYtErwyc5q9b
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5