General
-
Target
ee0aa33fea587aee4154bae09b8a708d56893db35ad3fdafe5e2036f220a66deN.exe
-
Size
120KB
-
Sample
241215-2qdq7asnfm
-
MD5
77c9f522fff9630db9cbf5670bad6650
-
SHA1
1980317c89bb2122adbb4b4c9bd72dd12089cbac
-
SHA256
ee0aa33fea587aee4154bae09b8a708d56893db35ad3fdafe5e2036f220a66de
-
SHA512
b855f784159e73c54e03044038e147519b6fbe92b5b585aa20ad9f625d069f702214b85b91853657b4a61878cf2c1b644aeec5f30d8fd2e0d1828ce19fd56c10
-
SSDEEP
3072:zVot+NpFP5PQI16gSg8EJGYNmS6oPGlzu2rsTM84:5+cpFP5QIkE9mS+lD
Static task
static1
Behavioral task
behavioral1
Sample
ee0aa33fea587aee4154bae09b8a708d56893db35ad3fdafe5e2036f220a66deN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ee0aa33fea587aee4154bae09b8a708d56893db35ad3fdafe5e2036f220a66deN.exe
-
Size
120KB
-
MD5
77c9f522fff9630db9cbf5670bad6650
-
SHA1
1980317c89bb2122adbb4b4c9bd72dd12089cbac
-
SHA256
ee0aa33fea587aee4154bae09b8a708d56893db35ad3fdafe5e2036f220a66de
-
SHA512
b855f784159e73c54e03044038e147519b6fbe92b5b585aa20ad9f625d069f702214b85b91853657b4a61878cf2c1b644aeec5f30d8fd2e0d1828ce19fd56c10
-
SSDEEP
3072:zVot+NpFP5PQI16gSg8EJGYNmS6oPGlzu2rsTM84:5+cpFP5QIkE9mS+lD
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5