General
-
Target
b748daf40cc41cfa71d1f296c7404b991ebc56f79495facabbc1ed644634477dN.exe
-
Size
120KB
-
Sample
241216-avh3xsvke1
-
MD5
fa44432dc294962084453521b54676e0
-
SHA1
e6fbbba2bce31f557b4c047ee3722a43f05056af
-
SHA256
b748daf40cc41cfa71d1f296c7404b991ebc56f79495facabbc1ed644634477d
-
SHA512
a3c279399ba0971a96e8e1686afc0679502bc35e199e56c4aec2ab618ca2ef08a26503f0d10ea699d24e488bca333319d5ea4966a79ab0ae3ce1e3e8a2f1f0bc
-
SSDEEP
3072:YVop30YoRn5K25IZBQWB59dMAOAqjwK2Ganh/:PyYwn5K25gBQWBjdjj
Static task
static1
Behavioral task
behavioral1
Sample
b748daf40cc41cfa71d1f296c7404b991ebc56f79495facabbc1ed644634477dN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b748daf40cc41cfa71d1f296c7404b991ebc56f79495facabbc1ed644634477dN.exe
-
Size
120KB
-
MD5
fa44432dc294962084453521b54676e0
-
SHA1
e6fbbba2bce31f557b4c047ee3722a43f05056af
-
SHA256
b748daf40cc41cfa71d1f296c7404b991ebc56f79495facabbc1ed644634477d
-
SHA512
a3c279399ba0971a96e8e1686afc0679502bc35e199e56c4aec2ab618ca2ef08a26503f0d10ea699d24e488bca333319d5ea4966a79ab0ae3ce1e3e8a2f1f0bc
-
SSDEEP
3072:YVop30YoRn5K25IZBQWB59dMAOAqjwK2Ganh/:PyYwn5K25gBQWBjdjj
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5