General
-
Target
c7aa34f320361f47db27e5d63fa4e5f7d8ef9207ff30040e4430f6a0a46afa8dN.exe
-
Size
120KB
-
Sample
241216-a52b9axlak
-
MD5
30333a8f701ac7bdb3a91cff2b286fd0
-
SHA1
a85e30cf7c2e21c7c73c6fea3f978c545c3008c5
-
SHA256
c7aa34f320361f47db27e5d63fa4e5f7d8ef9207ff30040e4430f6a0a46afa8d
-
SHA512
de2c1b6d73bc114594b6c51659ad5c17ddcc7e51db22b50ee635498a0bcb244be8428aabc777db6e9fa15d4026729e59ef97695e216abd1012ffe7b8640317fb
-
SSDEEP
3072:XIYyYgmQuQOHtX0jyTu++/7/496nYlYHV:XjdQjONt+DzGe
Static task
static1
Behavioral task
behavioral1
Sample
c7aa34f320361f47db27e5d63fa4e5f7d8ef9207ff30040e4430f6a0a46afa8dN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c7aa34f320361f47db27e5d63fa4e5f7d8ef9207ff30040e4430f6a0a46afa8dN.exe
-
Size
120KB
-
MD5
30333a8f701ac7bdb3a91cff2b286fd0
-
SHA1
a85e30cf7c2e21c7c73c6fea3f978c545c3008c5
-
SHA256
c7aa34f320361f47db27e5d63fa4e5f7d8ef9207ff30040e4430f6a0a46afa8d
-
SHA512
de2c1b6d73bc114594b6c51659ad5c17ddcc7e51db22b50ee635498a0bcb244be8428aabc777db6e9fa15d4026729e59ef97695e216abd1012ffe7b8640317fb
-
SSDEEP
3072:XIYyYgmQuQOHtX0jyTu++/7/496nYlYHV:XjdQjONt+DzGe
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5