General
-
Target
cda8521b9fcb32d5dc80799731574f3d0f600e874eef12e3be72ed0cb057a54aN.exe
-
Size
120KB
-
Sample
241216-a6qxxaxlcq
-
MD5
d5dbc13780b05b2eed64c7c39ae726c0
-
SHA1
100266a6d854780918e7c119771cc2dea9490ced
-
SHA256
cda8521b9fcb32d5dc80799731574f3d0f600e874eef12e3be72ed0cb057a54a
-
SHA512
5d12b0ed418cefb68bc2364cf992e0a54cc7e755870e2d35bde29427d24a2d55c493f156c6adcf3d5d3499db433048fc43b15f6f39ac41a9f5d51977abdf85bc
-
SSDEEP
1536:o7J4V/TZz8aRRGoVrI2x1q6sYBngcYCkPecOI/vFsKKHdOBxUaM3HJ5FEiSYkJTh:oqzBcoVrNbqkpgP5KHc1eHJrEwkDL
Static task
static1
Behavioral task
behavioral1
Sample
cda8521b9fcb32d5dc80799731574f3d0f600e874eef12e3be72ed0cb057a54aN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cda8521b9fcb32d5dc80799731574f3d0f600e874eef12e3be72ed0cb057a54aN.exe
-
Size
120KB
-
MD5
d5dbc13780b05b2eed64c7c39ae726c0
-
SHA1
100266a6d854780918e7c119771cc2dea9490ced
-
SHA256
cda8521b9fcb32d5dc80799731574f3d0f600e874eef12e3be72ed0cb057a54a
-
SHA512
5d12b0ed418cefb68bc2364cf992e0a54cc7e755870e2d35bde29427d24a2d55c493f156c6adcf3d5d3499db433048fc43b15f6f39ac41a9f5d51977abdf85bc
-
SSDEEP
1536:o7J4V/TZz8aRRGoVrI2x1q6sYBngcYCkPecOI/vFsKKHdOBxUaM3HJ5FEiSYkJTh:oqzBcoVrNbqkpgP5KHc1eHJrEwkDL
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5