General
-
Target
0f028d4a8f5e250b5cb28a158b32aab4cd7e6193db0c5d49c13d489f54ea0070N.exe
-
Size
120KB
-
Sample
241216-a3fmrsxjhn
-
MD5
b80a20c7c347512ee40a9803c0391e70
-
SHA1
a1d325fe6ad56b814400f23b923bd905f2c04f28
-
SHA256
0f028d4a8f5e250b5cb28a158b32aab4cd7e6193db0c5d49c13d489f54ea0070
-
SHA512
84185e2db6785bb98871361c1b8afe7634d1591efadc660e0204a9a61a12bdd6b5fa4f2701ebbdc58669f5b669e8c9985885fa68ed82c1da53c3add4bb77318e
-
SSDEEP
1536:8fJD/SiCnm89+ZpXGJjBRM+icLLE0POzzZct48G2rSUw4wg/6qdhl3m:6Idm8mXGJAJ0PSZVehZFJD3m
Static task
static1
Behavioral task
behavioral1
Sample
0f028d4a8f5e250b5cb28a158b32aab4cd7e6193db0c5d49c13d489f54ea0070N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0f028d4a8f5e250b5cb28a158b32aab4cd7e6193db0c5d49c13d489f54ea0070N.exe
-
Size
120KB
-
MD5
b80a20c7c347512ee40a9803c0391e70
-
SHA1
a1d325fe6ad56b814400f23b923bd905f2c04f28
-
SHA256
0f028d4a8f5e250b5cb28a158b32aab4cd7e6193db0c5d49c13d489f54ea0070
-
SHA512
84185e2db6785bb98871361c1b8afe7634d1591efadc660e0204a9a61a12bdd6b5fa4f2701ebbdc58669f5b669e8c9985885fa68ed82c1da53c3add4bb77318e
-
SSDEEP
1536:8fJD/SiCnm89+ZpXGJjBRM+icLLE0POzzZct48G2rSUw4wg/6qdhl3m:6Idm8mXGJAJ0PSZVehZFJD3m
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5