General
-
Target
512bc6701aeeec677597bb773f59eb4504d424947f4392fa9338285f292f58dfN.exe
-
Size
120KB
-
Sample
241215-1slzxaymbx
-
MD5
1a03f47b50f4ac275a98406ef27c8400
-
SHA1
41a3534a04be7bb112d33f3a31f3cb2caf51a73d
-
SHA256
512bc6701aeeec677597bb773f59eb4504d424947f4392fa9338285f292f58df
-
SHA512
00cf9d4419268b75427471dd50bb559908980548ff25a31848c79078092b8d92f4cecdb968819e4285d4a38c560e86af0eeb6994e75aa3e43fccc98aa6b3a06e
-
SSDEEP
1536:qIiI09MI8eRjlw0DG1/Fw8XjDeJHV7g1lM0SL6Ek0UTKL0cr:10Tdplw0V8XN70w
Static task
static1
Behavioral task
behavioral1
Sample
512bc6701aeeec677597bb773f59eb4504d424947f4392fa9338285f292f58dfN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
512bc6701aeeec677597bb773f59eb4504d424947f4392fa9338285f292f58dfN.exe
-
Size
120KB
-
MD5
1a03f47b50f4ac275a98406ef27c8400
-
SHA1
41a3534a04be7bb112d33f3a31f3cb2caf51a73d
-
SHA256
512bc6701aeeec677597bb773f59eb4504d424947f4392fa9338285f292f58df
-
SHA512
00cf9d4419268b75427471dd50bb559908980548ff25a31848c79078092b8d92f4cecdb968819e4285d4a38c560e86af0eeb6994e75aa3e43fccc98aa6b3a06e
-
SSDEEP
1536:qIiI09MI8eRjlw0DG1/Fw8XjDeJHV7g1lM0SL6Ek0UTKL0cr:10Tdplw0V8XN70w
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5