General
-
Target
72f2cd8708d129af01bc33c3fd6425749b6d86068b19b4f16689c4a19290af33N.exe
-
Size
120KB
-
Sample
241216-awgw9avlbs
-
MD5
f7300e3a5be0dc3ea09fc2959bc91560
-
SHA1
2732711ac33b5acceb6f23930a6415092cc55561
-
SHA256
72f2cd8708d129af01bc33c3fd6425749b6d86068b19b4f16689c4a19290af33
-
SHA512
710fc0117af83e03d421f0f5550d097d34ac624b49dad95d7332de44ab23f5cf9ef2c6ecc1658f0807b86069f598b5fd801ed5a99cfcc05437946a1a99ff4224
-
SSDEEP
1536:/M4kngq7u0vgmjtvbZO3+9blJuE9xTeAzYiAxdB9MqUL6Slm1sAruxyX1mKN8O5B:xknHvq3+zx36kYH9A6Mm1V2CoKNL
Static task
static1
Behavioral task
behavioral1
Sample
72f2cd8708d129af01bc33c3fd6425749b6d86068b19b4f16689c4a19290af33N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
72f2cd8708d129af01bc33c3fd6425749b6d86068b19b4f16689c4a19290af33N.exe
-
Size
120KB
-
MD5
f7300e3a5be0dc3ea09fc2959bc91560
-
SHA1
2732711ac33b5acceb6f23930a6415092cc55561
-
SHA256
72f2cd8708d129af01bc33c3fd6425749b6d86068b19b4f16689c4a19290af33
-
SHA512
710fc0117af83e03d421f0f5550d097d34ac624b49dad95d7332de44ab23f5cf9ef2c6ecc1658f0807b86069f598b5fd801ed5a99cfcc05437946a1a99ff4224
-
SSDEEP
1536:/M4kngq7u0vgmjtvbZO3+9blJuE9xTeAzYiAxdB9MqUL6Slm1sAruxyX1mKN8O5B:xknHvq3+zx36kYH9A6Mm1V2CoKNL
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5