General
-
Target
1eac8d333da2e2de916253b25078ecc0a79bf9819c9a0cca21ecf615c6c454a3N.exe
-
Size
120KB
-
Sample
241215-1j833sxrfv
-
MD5
1d356ab5d729bec47351320b6661ad00
-
SHA1
cf50311985d4ab03a4da5dd626d35f7a283ee6e0
-
SHA256
1eac8d333da2e2de916253b25078ecc0a79bf9819c9a0cca21ecf615c6c454a3
-
SHA512
b92a6b0d2d238b2b6917d358b74af412e658f35002bbb7d9b656abf9e7e87b0d97675d4acbbe8fd962c75df5de4a39312f1208464f6bba3c536d35c2bde3b55e
-
SSDEEP
3072:jN8B9Ml2INlodf2315yhDnGEUGujAXP8WEKP0X5J:z2INOdfgyhDnGdGujHfF5
Static task
static1
Behavioral task
behavioral1
Sample
1eac8d333da2e2de916253b25078ecc0a79bf9819c9a0cca21ecf615c6c454a3N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1eac8d333da2e2de916253b25078ecc0a79bf9819c9a0cca21ecf615c6c454a3N.exe
-
Size
120KB
-
MD5
1d356ab5d729bec47351320b6661ad00
-
SHA1
cf50311985d4ab03a4da5dd626d35f7a283ee6e0
-
SHA256
1eac8d333da2e2de916253b25078ecc0a79bf9819c9a0cca21ecf615c6c454a3
-
SHA512
b92a6b0d2d238b2b6917d358b74af412e658f35002bbb7d9b656abf9e7e87b0d97675d4acbbe8fd962c75df5de4a39312f1208464f6bba3c536d35c2bde3b55e
-
SSDEEP
3072:jN8B9Ml2INlodf2315yhDnGEUGujAXP8WEKP0X5J:z2INOdfgyhDnGdGujHfF5
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5