General
-
Target
3b838016d6def264f54d30fa3240cb11e73280432362fd91e4bb06d3b8557a3f.exe
-
Size
120KB
-
Sample
241216-2zjc2atmck
-
MD5
054efd55c88573802e57210578a7b5eb
-
SHA1
b548673ce8b935dac873b7905fc5fe7788e2e167
-
SHA256
3b838016d6def264f54d30fa3240cb11e73280432362fd91e4bb06d3b8557a3f
-
SHA512
420709496ddb28c8eb1efc36d3f3cfe779b23bc3957f427a71dbac278debf12d8f34fdf76d954e4508ac3b2bd83e7b5d6016c110ff53074d2d0e1a00e733e607
-
SSDEEP
1536:dre7/EN+0bCpYB03nJzHYo6GlPAS4qUvOGgn4zUyz2obGNcfC4PqQoQP/9mBzo3:drQ/EE0GBnxJoS4xjg4zUxob8cfzPYe3
Static task
static1
Behavioral task
behavioral1
Sample
3b838016d6def264f54d30fa3240cb11e73280432362fd91e4bb06d3b8557a3f.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3b838016d6def264f54d30fa3240cb11e73280432362fd91e4bb06d3b8557a3f.exe
-
Size
120KB
-
MD5
054efd55c88573802e57210578a7b5eb
-
SHA1
b548673ce8b935dac873b7905fc5fe7788e2e167
-
SHA256
3b838016d6def264f54d30fa3240cb11e73280432362fd91e4bb06d3b8557a3f
-
SHA512
420709496ddb28c8eb1efc36d3f3cfe779b23bc3957f427a71dbac278debf12d8f34fdf76d954e4508ac3b2bd83e7b5d6016c110ff53074d2d0e1a00e733e607
-
SSDEEP
1536:dre7/EN+0bCpYB03nJzHYo6GlPAS4qUvOGgn4zUyz2obGNcfC4PqQoQP/9mBzo3:drQ/EE0GBnxJoS4xjg4zUxob8cfzPYe3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5