General
-
Target
a9ba38b98e506ebe72697420ba9474de03cefbf67a368d8383975e801c46f61c.exe
-
Size
120KB
-
Sample
241216-3qmjrstmgv
-
MD5
6e9755d2725f5d54ff7015e406c4b7cd
-
SHA1
9a93d85e9a506341bc65be7d18956a88be3c7bf0
-
SHA256
a9ba38b98e506ebe72697420ba9474de03cefbf67a368d8383975e801c46f61c
-
SHA512
0e961a6b52533d223459cc03e73af277b439b4f76e3c5fe70915be944a81e1441f5ebd04f58df6439b1b16b13a7a96bb071eb48a0799a71f3a8bc9610c7491f4
-
SSDEEP
1536:kevW5nAOIu8sSfL6DcNvFmXXyTp+o1Hk5Utt8funBoAp13Uxy5Nn6C:bvW5n7CftIe58at8fmoArUWNnP
Static task
static1
Behavioral task
behavioral1
Sample
a9ba38b98e506ebe72697420ba9474de03cefbf67a368d8383975e801c46f61c.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a9ba38b98e506ebe72697420ba9474de03cefbf67a368d8383975e801c46f61c.exe
-
Size
120KB
-
MD5
6e9755d2725f5d54ff7015e406c4b7cd
-
SHA1
9a93d85e9a506341bc65be7d18956a88be3c7bf0
-
SHA256
a9ba38b98e506ebe72697420ba9474de03cefbf67a368d8383975e801c46f61c
-
SHA512
0e961a6b52533d223459cc03e73af277b439b4f76e3c5fe70915be944a81e1441f5ebd04f58df6439b1b16b13a7a96bb071eb48a0799a71f3a8bc9610c7491f4
-
SSDEEP
1536:kevW5nAOIu8sSfL6DcNvFmXXyTp+o1Hk5Utt8funBoAp13Uxy5Nn6C:bvW5n7CftIe58at8fmoArUWNnP
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5