General
-
Target
812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184.exe
-
Size
120KB
-
Sample
241211-k4e3qszrgp
-
MD5
51be7c2c4f515baa585791f71e8cbe3b
-
SHA1
61ba1e9f2f4ed63c399b7ca50f6dc8786cfa9f5d
-
SHA256
812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184
-
SHA512
2f2469c7e9ed3bf94a289088c334d962951384cd6504b2bd556d0a93197cb428c0d2797d22fb09852b6fd0e05a6125488f9c3ad664ff99957d0a5da51f5dee9e
-
SSDEEP
1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZUA:GJC+bCPcB/kZXFvZhSOG4+MvZ7A
Static task
static1
Behavioral task
behavioral1
Sample
812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184.exe
-
Size
120KB
-
MD5
51be7c2c4f515baa585791f71e8cbe3b
-
SHA1
61ba1e9f2f4ed63c399b7ca50f6dc8786cfa9f5d
-
SHA256
812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184
-
SHA512
2f2469c7e9ed3bf94a289088c334d962951384cd6504b2bd556d0a93197cb428c0d2797d22fb09852b6fd0e05a6125488f9c3ad664ff99957d0a5da51f5dee9e
-
SSDEEP
1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZUA:GJC+bCPcB/kZXFvZhSOG4+MvZ7A
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5