General
-
Target
b5ecffa1bda1947a2d728aeaa4b9335f0056aaabfe882bac211f51233892cdcbN.exe
-
Size
120KB
-
Sample
241216-chdzjszmhp
-
MD5
0f2603bdf67ebc7dad04a01f8f511750
-
SHA1
04233c044253552f396113d364381c902c2a008b
-
SHA256
b5ecffa1bda1947a2d728aeaa4b9335f0056aaabfe882bac211f51233892cdcb
-
SHA512
8a3ba801613bde4fa58408be1218f88fb6d0143f06e467ab11c1e7ead74e756643aa8ef6dee36a91989b762beb685359ed3e40a0851ded0d9ad289176a994e9b
-
SSDEEP
3072:Wf4mCovkq3f2xGxFl6QrDz5GFrV7u5qA9bqmnEMq4h:gt7p20xjnPqrVq
Static task
static1
Behavioral task
behavioral1
Sample
b5ecffa1bda1947a2d728aeaa4b9335f0056aaabfe882bac211f51233892cdcbN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b5ecffa1bda1947a2d728aeaa4b9335f0056aaabfe882bac211f51233892cdcbN.exe
-
Size
120KB
-
MD5
0f2603bdf67ebc7dad04a01f8f511750
-
SHA1
04233c044253552f396113d364381c902c2a008b
-
SHA256
b5ecffa1bda1947a2d728aeaa4b9335f0056aaabfe882bac211f51233892cdcb
-
SHA512
8a3ba801613bde4fa58408be1218f88fb6d0143f06e467ab11c1e7ead74e756643aa8ef6dee36a91989b762beb685359ed3e40a0851ded0d9ad289176a994e9b
-
SSDEEP
3072:Wf4mCovkq3f2xGxFl6QrDz5GFrV7u5qA9bqmnEMq4h:gt7p20xjnPqrVq
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5