General
-
Target
5c3cac249f15d8609a21d65c9eb9aa3952f038ec8ad66f8730ecd8db6ed00474N.exe
-
Size
120KB
-
Sample
241211-jzze5stqcy
-
MD5
1c6525d61a87ab19573777e738d828c0
-
SHA1
5e6f407f8f091a9f83b9579a03833801881c557b
-
SHA256
5c3cac249f15d8609a21d65c9eb9aa3952f038ec8ad66f8730ecd8db6ed00474
-
SHA512
263203767e616bb277292d08ae11a147aea0a53c8d509c36110b6408e9b058d560c4756edd752d263ef986237b3611a39e2533ec0d562a8ea167acf17d551fde
-
SSDEEP
1536:0I7o6tfzcbS8r8DMlsCBDM4kUeJSvtnrlIvAXSAARye0A3+YgfRMiFQNvu:0WcbJ8DGhBoZp+nrlRX/ARL3+Yg5Uvu
Static task
static1
Behavioral task
behavioral1
Sample
5c3cac249f15d8609a21d65c9eb9aa3952f038ec8ad66f8730ecd8db6ed00474N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5c3cac249f15d8609a21d65c9eb9aa3952f038ec8ad66f8730ecd8db6ed00474N.exe
-
Size
120KB
-
MD5
1c6525d61a87ab19573777e738d828c0
-
SHA1
5e6f407f8f091a9f83b9579a03833801881c557b
-
SHA256
5c3cac249f15d8609a21d65c9eb9aa3952f038ec8ad66f8730ecd8db6ed00474
-
SHA512
263203767e616bb277292d08ae11a147aea0a53c8d509c36110b6408e9b058d560c4756edd752d263ef986237b3611a39e2533ec0d562a8ea167acf17d551fde
-
SSDEEP
1536:0I7o6tfzcbS8r8DMlsCBDM4kUeJSvtnrlIvAXSAARye0A3+YgfRMiFQNvu:0WcbJ8DGhBoZp+nrlRX/ARL3+Yg5Uvu
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5