General
-
Target
4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00.exe
-
Size
120KB
-
Sample
241216-3c1t8stjdt
-
MD5
317c2b9be6c98f56457d0f8cb3fd41b7
-
SHA1
e5ea097b408ff0dbeed5f8ae644096e60c5ac9b1
-
SHA256
4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00
-
SHA512
61c6382f829e33b862c99ef019605e5acb9d26e0ce1c105b1846f3dd0ff432a64933fc6e6dd6055ef18d08b0695683d15796a130bf239942b7a31f091fd9dab7
-
SSDEEP
3072:jJUAM5JRCZomxeNa0G0jwM8Oj1MD1fMvYhk7O5Er:NU7jRbmxea0G0jC1fxC3
Static task
static1
Behavioral task
behavioral1
Sample
4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00.exe
-
Size
120KB
-
MD5
317c2b9be6c98f56457d0f8cb3fd41b7
-
SHA1
e5ea097b408ff0dbeed5f8ae644096e60c5ac9b1
-
SHA256
4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00
-
SHA512
61c6382f829e33b862c99ef019605e5acb9d26e0ce1c105b1846f3dd0ff432a64933fc6e6dd6055ef18d08b0695683d15796a130bf239942b7a31f091fd9dab7
-
SSDEEP
3072:jJUAM5JRCZomxeNa0G0jwM8Oj1MD1fMvYhk7O5Er:NU7jRbmxea0G0jC1fxC3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5