General
-
Target
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
-
Size
1.0MB
-
Sample
241210-tldxdsvlcq
-
MD5
14c057aa28de8f08e9ff1498351f6d90
-
SHA1
ebe3b736756ca6b81752459f02cce257e3381263
-
SHA256
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707
-
SHA512
070b87e18df1a594c05c65e15fb3c92a99952438635df3c47c871ec2b6366e9488bf5a86e40a530321446a35edc3e85d6fcea71f751ae70797cf4a286b47706a
-
SSDEEP
12288:MYEWcMwLfzH5BUdtsKR0yCKM8CxF7h5NGyENSrzXVoGsqACwUeCCbSzVczdDsgcx:MYUk3X5N2FXNGCrZEqACXeCXcdve1D
Static task
static1
Behavioral task
behavioral1
Sample
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ProcDll.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707N.exe
-
Size
1.0MB
-
MD5
14c057aa28de8f08e9ff1498351f6d90
-
SHA1
ebe3b736756ca6b81752459f02cce257e3381263
-
SHA256
ef71464691d3cd3708c47239a91dffc2fe86ad260d5189b4be116b2cdd3a7707
-
SHA512
070b87e18df1a594c05c65e15fb3c92a99952438635df3c47c871ec2b6366e9488bf5a86e40a530321446a35edc3e85d6fcea71f751ae70797cf4a286b47706a
-
SSDEEP
12288:MYEWcMwLfzH5BUdtsKR0yCKM8CxF7h5NGyENSrzXVoGsqACwUeCCbSzVczdDsgcx:MYUk3X5N2FXNGCrZEqACXeCXcdve1D
-
Modifies firewall policy service
-
Sality family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
cae8cbe148469accf1ccf9692316e8f9
-
SHA1
64e9308e6b541ad99c6fe4dc90829c7e17794ea4
-
SHA256
8a27ff148592c3bdd33e5e9e87b9b05f54a1c136d002746696aeb9e9bd426395
-
SHA512
72f1c7ec5f272d51c3f712c3b03eead35c3c0540adc5cd1f27004fb659f384720aa841f32fb76ada506398be767c3851633c95755af9af3d6b8980d74cee1023
-
SSDEEP
48:SdcTYWeApYxYlxamAWHN+EuWkGWBBWAGGrx3pMt4z8mtJ73NofYZVSA:QZWGSxamjHNDuWRWBBxrhSbmtJ73RV
Score3/10 -
-
-
Target
$PLUGINSDIR/ProcDll.dll
-
Size
1.5MB
-
MD5
0d360c149b2c6649637985ee8b0a90a8
-
SHA1
2b86f26310127645bc0c758ddf1fd0f42465b053
-
SHA256
9088ac40d822a32efaf756d4d866faa72e69070d691907adfb0dfe916ccdb05f
-
SHA512
96342c15738fc766ce7ea65b5c4a18829d68cc65f1ce931733820d9c9bda4e8bf570f90e26726b063eeddfc40bf454c6ae7751936c5d085cbc03d7f6989f7091
-
SSDEEP
24576:PeQZyM8hOwcMRkASS2dTY1cPycfaxS0EwkNSoTo54Qh+ba3UdyjfDIvvIYu6aQjW:5y5hBSI1cPyO90kdycJuwj2Km
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5