General
-
Target
7e1572fe82db0f91e7fa08c196ab7a9f4782bcabe5c56a2121e45bed36e8e114
-
Size
120KB
-
Sample
241211-3l3eesxkbj
-
MD5
910da9890bf3a72219620872311541f4
-
SHA1
53d7ccd2b1c7b7c811d69a19ded211a9ee4a5c6d
-
SHA256
7e1572fe82db0f91e7fa08c196ab7a9f4782bcabe5c56a2121e45bed36e8e114
-
SHA512
37ddc7eff326865ac600cc0f7ee85eb3a0e5081b2f0f7bd2c1ea638c7a9cbe9aba368dd87c49143c5e06ea91fb184e5e548c2827d878e64b958fe209524a9338
-
SSDEEP
3072:kOdQyEFAP2EydKA5d7s/bNomIYgrZAdoH1XSpah:NWye+8wA5d7sTNomIY6ntbh
Static task
static1
Behavioral task
behavioral1
Sample
7e1572fe82db0f91e7fa08c196ab7a9f4782bcabe5c56a2121e45bed36e8e114.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7e1572fe82db0f91e7fa08c196ab7a9f4782bcabe5c56a2121e45bed36e8e114
-
Size
120KB
-
MD5
910da9890bf3a72219620872311541f4
-
SHA1
53d7ccd2b1c7b7c811d69a19ded211a9ee4a5c6d
-
SHA256
7e1572fe82db0f91e7fa08c196ab7a9f4782bcabe5c56a2121e45bed36e8e114
-
SHA512
37ddc7eff326865ac600cc0f7ee85eb3a0e5081b2f0f7bd2c1ea638c7a9cbe9aba368dd87c49143c5e06ea91fb184e5e548c2827d878e64b958fe209524a9338
-
SSDEEP
3072:kOdQyEFAP2EydKA5d7s/bNomIYgrZAdoH1XSpah:NWye+8wA5d7sTNomIY6ntbh
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5