General
-
Target
1d936f496a28a2e3406aff52f325871ac5da02b3d3db15847fe3f862348f22bbN.exe
-
Size
120KB
-
Sample
241216-cw5z7ayrbv
-
MD5
b24d4cd001a1d7a5f5f44e1ec616ef70
-
SHA1
a21d29c215f9335f2d4ee8a02988abd78e66edab
-
SHA256
1d936f496a28a2e3406aff52f325871ac5da02b3d3db15847fe3f862348f22bb
-
SHA512
ed198ab6993ee6fbfccbf99eaf8ffb6673cd41d417974a7ee6202db2df14d21252b9e06cb6bb44b52c64892af3e47dd466e5945abbdbdf25fef5c378ef419ff0
-
SSDEEP
3072:/1k63SvU/BQ4+0hnNVSXprxee1vY+/Thna:/1k6iKv/PIXPeovYaa
Static task
static1
Behavioral task
behavioral1
Sample
1d936f496a28a2e3406aff52f325871ac5da02b3d3db15847fe3f862348f22bbN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1d936f496a28a2e3406aff52f325871ac5da02b3d3db15847fe3f862348f22bbN.exe
-
Size
120KB
-
MD5
b24d4cd001a1d7a5f5f44e1ec616ef70
-
SHA1
a21d29c215f9335f2d4ee8a02988abd78e66edab
-
SHA256
1d936f496a28a2e3406aff52f325871ac5da02b3d3db15847fe3f862348f22bb
-
SHA512
ed198ab6993ee6fbfccbf99eaf8ffb6673cd41d417974a7ee6202db2df14d21252b9e06cb6bb44b52c64892af3e47dd466e5945abbdbdf25fef5c378ef419ff0
-
SSDEEP
3072:/1k63SvU/BQ4+0hnNVSXprxee1vY+/Thna:/1k6iKv/PIXPeovYaa
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5