General
-
Target
654645d0e63f8111c2c8d34d4016c4a429e18865162204c7384541e6fb1330fdN.exe
-
Size
120KB
-
Sample
241216-az4kesvmfz
-
MD5
790dc15e1a2dbcf016963904499a8520
-
SHA1
87786547ed264dcc5958ac4b207a45663fe43cca
-
SHA256
654645d0e63f8111c2c8d34d4016c4a429e18865162204c7384541e6fb1330fd
-
SHA512
09d0533f48f9d8d7e9e0dfc3e2c868245005ec32b19e97aeefa38fffa023d05fcb381dcb11535324ff72b220910346f219c6942b84127a02eb9af3118d77167e
-
SSDEEP
1536:zr+6wOnMvsnZJjb2HXki8L2TkWZJVxUbVeessIaGiyLyxTJQp6tSDEDHfI:Hp6vSB2HtgHWZ3xUZedH2/9O6wD4
Static task
static1
Behavioral task
behavioral1
Sample
654645d0e63f8111c2c8d34d4016c4a429e18865162204c7384541e6fb1330fdN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
654645d0e63f8111c2c8d34d4016c4a429e18865162204c7384541e6fb1330fdN.exe
-
Size
120KB
-
MD5
790dc15e1a2dbcf016963904499a8520
-
SHA1
87786547ed264dcc5958ac4b207a45663fe43cca
-
SHA256
654645d0e63f8111c2c8d34d4016c4a429e18865162204c7384541e6fb1330fd
-
SHA512
09d0533f48f9d8d7e9e0dfc3e2c868245005ec32b19e97aeefa38fffa023d05fcb381dcb11535324ff72b220910346f219c6942b84127a02eb9af3118d77167e
-
SSDEEP
1536:zr+6wOnMvsnZJjb2HXki8L2TkWZJVxUbVeessIaGiyLyxTJQp6tSDEDHfI:Hp6vSB2HtgHWZ3xUZedH2/9O6wD4
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5