General
-
Target
1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702N.exe
-
Size
120KB
-
Sample
241211-jbfywssqfy
-
MD5
916f89286399f2f15d4b1705d02c7ec0
-
SHA1
8be3ad8a04e6edbf735efcd9418b4b67b3c7dea4
-
SHA256
1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702
-
SHA512
73e185eef1e07f6694cff92c52380732e223a4fe6ce039fd6dccb721260424e9df8c6ad7ca4c5c9623f8cb3e154232cfc7d0553d14c80fae0f21958dba6b73fc
-
SSDEEP
1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZU:GJC+bCPcB/kZXFvZhSOG4+MvZ7
Static task
static1
Behavioral task
behavioral1
Sample
1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702N.exe
-
Size
120KB
-
MD5
916f89286399f2f15d4b1705d02c7ec0
-
SHA1
8be3ad8a04e6edbf735efcd9418b4b67b3c7dea4
-
SHA256
1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702
-
SHA512
73e185eef1e07f6694cff92c52380732e223a4fe6ce039fd6dccb721260424e9df8c6ad7ca4c5c9623f8cb3e154232cfc7d0553d14c80fae0f21958dba6b73fc
-
SSDEEP
1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZU:GJC+bCPcB/kZXFvZhSOG4+MvZ7
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5