General
-
Target
0f095b5801b21ab06fdf36d4b10aebee384705b8f67289bc27f056380f39d56bN.exe
-
Size
120KB
-
Sample
241216-3w971svlhk
-
MD5
41cfd1174b2704ce373e837926bd7440
-
SHA1
6a57684ebfa33ff82fcedf0352c7a9c22b9d996a
-
SHA256
0f095b5801b21ab06fdf36d4b10aebee384705b8f67289bc27f056380f39d56b
-
SHA512
4e829cdaa5228cebe2f3a2662e1e6eb8024074f6774001bd22812f552e2615a5d5c059197306dc6eac0b98f8558988bfd1326d66eabf4a06bbdf9be0e3b54a35
-
SSDEEP
3072:wBVr2IaPf1TP+2nKk3Kkwkum+pTl8/pjUdpchpksSl:QV+f1j+2nFKk+p4UL9dl
Static task
static1
Behavioral task
behavioral1
Sample
0f095b5801b21ab06fdf36d4b10aebee384705b8f67289bc27f056380f39d56bN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0f095b5801b21ab06fdf36d4b10aebee384705b8f67289bc27f056380f39d56bN.exe
-
Size
120KB
-
MD5
41cfd1174b2704ce373e837926bd7440
-
SHA1
6a57684ebfa33ff82fcedf0352c7a9c22b9d996a
-
SHA256
0f095b5801b21ab06fdf36d4b10aebee384705b8f67289bc27f056380f39d56b
-
SHA512
4e829cdaa5228cebe2f3a2662e1e6eb8024074f6774001bd22812f552e2615a5d5c059197306dc6eac0b98f8558988bfd1326d66eabf4a06bbdf9be0e3b54a35
-
SSDEEP
3072:wBVr2IaPf1TP+2nKk3Kkwkum+pTl8/pjUdpchpksSl:QV+f1j+2nFKk+p4UL9dl
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5