General
-
Target
aa773c9cdde021796a6543cdf2870f4b54e455b2635dfead3208674d0119cb89N.exe
-
Size
120KB
-
Sample
241216-gcyh8awqes
-
MD5
c5ca1d78bf13ceeec24d75ea42a1ab30
-
SHA1
9f747213d015423497e8221091b2cad53020af91
-
SHA256
aa773c9cdde021796a6543cdf2870f4b54e455b2635dfead3208674d0119cb89
-
SHA512
48ffe92c96992ef72898a7feb581fdec507f21497e68d9c1c2d409911483c51d38830a98ee0b18e37383bf40545e9258b6abe11b29aa11454eeda5eba8c88fb1
-
SSDEEP
3072:rWVc7tKuy+OliRf7CzVBP1xUt3rOaeTcU6/Unfap:rW/Hw7oBPU/EcU6snf
Static task
static1
Behavioral task
behavioral1
Sample
aa773c9cdde021796a6543cdf2870f4b54e455b2635dfead3208674d0119cb89N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
aa773c9cdde021796a6543cdf2870f4b54e455b2635dfead3208674d0119cb89N.exe
-
Size
120KB
-
MD5
c5ca1d78bf13ceeec24d75ea42a1ab30
-
SHA1
9f747213d015423497e8221091b2cad53020af91
-
SHA256
aa773c9cdde021796a6543cdf2870f4b54e455b2635dfead3208674d0119cb89
-
SHA512
48ffe92c96992ef72898a7feb581fdec507f21497e68d9c1c2d409911483c51d38830a98ee0b18e37383bf40545e9258b6abe11b29aa11454eeda5eba8c88fb1
-
SSDEEP
3072:rWVc7tKuy+OliRf7CzVBP1xUt3rOaeTcU6/Unfap:rW/Hw7oBPU/EcU6snf
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5