General
-
Target
9dc324bc58636344e18a6aeb264152ab5e389509d1ab64c830867dc72a95a722.exe
-
Size
120KB
-
Sample
241211-fwjzhasqhl
-
MD5
8e33a05cd99e64297a0a2035587a1285
-
SHA1
026d5818f2d6f3a49442ed1b8e88887385b589a4
-
SHA256
9dc324bc58636344e18a6aeb264152ab5e389509d1ab64c830867dc72a95a722
-
SHA512
d8795265c9a2bfdef5c6ac24ade378cbea3c9c2ecb5991dcc3a17f757d566904cbb4e2c6dd20572a96c21ba3552f87b3a7c6c0886e5ac28082e27f3d40fd84f5
-
SSDEEP
3072:GuARllFLwB00FG2FbA9YqT2YJpm2RqtP3LJbS:qRlHLt0FA91Tj9Rql3LZS
Static task
static1
Behavioral task
behavioral1
Sample
9dc324bc58636344e18a6aeb264152ab5e389509d1ab64c830867dc72a95a722.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9dc324bc58636344e18a6aeb264152ab5e389509d1ab64c830867dc72a95a722.exe
-
Size
120KB
-
MD5
8e33a05cd99e64297a0a2035587a1285
-
SHA1
026d5818f2d6f3a49442ed1b8e88887385b589a4
-
SHA256
9dc324bc58636344e18a6aeb264152ab5e389509d1ab64c830867dc72a95a722
-
SHA512
d8795265c9a2bfdef5c6ac24ade378cbea3c9c2ecb5991dcc3a17f757d566904cbb4e2c6dd20572a96c21ba3552f87b3a7c6c0886e5ac28082e27f3d40fd84f5
-
SSDEEP
3072:GuARllFLwB00FG2FbA9YqT2YJpm2RqtP3LJbS:qRlHLt0FA91Tj9Rql3LZS
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5