General
-
Target
e92bfd904a035eb87816b93ae093c317a920423a6cb8a9973797b37128af63deN.exe
-
Size
120KB
-
Sample
241216-3wp7vavlfn
-
MD5
ac1deaeaf1a7097a40f77148008e3b30
-
SHA1
9eb08441ce493a099f4ea41f067178c79d490b33
-
SHA256
e92bfd904a035eb87816b93ae093c317a920423a6cb8a9973797b37128af63de
-
SHA512
a79469fe6927097ab052232c30c7376337e5f1d89b7b9f391dbdf0ea92989dba81539aa9ee8cbcef66653030dfcf06a537816011642b541add9ceb9aa74d6595
-
SSDEEP
1536:Toe7WY6FtLYMbhy4cCm59+NHIAy/zIC52cfl9V6dcvFezRq1Ktg/mm2gv:TX7cFs4iV2SllQzM1Ktg/i
Static task
static1
Behavioral task
behavioral1
Sample
e92bfd904a035eb87816b93ae093c317a920423a6cb8a9973797b37128af63deN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e92bfd904a035eb87816b93ae093c317a920423a6cb8a9973797b37128af63deN.exe
-
Size
120KB
-
MD5
ac1deaeaf1a7097a40f77148008e3b30
-
SHA1
9eb08441ce493a099f4ea41f067178c79d490b33
-
SHA256
e92bfd904a035eb87816b93ae093c317a920423a6cb8a9973797b37128af63de
-
SHA512
a79469fe6927097ab052232c30c7376337e5f1d89b7b9f391dbdf0ea92989dba81539aa9ee8cbcef66653030dfcf06a537816011642b541add9ceb9aa74d6595
-
SSDEEP
1536:Toe7WY6FtLYMbhy4cCm59+NHIAy/zIC52cfl9V6dcvFezRq1Ktg/mm2gv:TX7cFs4iV2SllQzM1Ktg/i
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5