General
-
Target
4f251a3c0b3f8b757b7d00fd45078d1d1cdae5cc08ce54110d2ba9b9269711ecN.exe
-
Size
120KB
-
Sample
241216-h4wpda1mfl
-
MD5
78fa5f605da24576bcfdd52ce9960400
-
SHA1
3465c6631791fd06c8b49cd97c6cf7f5440bda99
-
SHA256
4f251a3c0b3f8b757b7d00fd45078d1d1cdae5cc08ce54110d2ba9b9269711ec
-
SHA512
e5e369ca8b8de4568eba165471c143e51ca7de9bd1bb149fac1165c033a9050979af076e1df130be6b4c718ae3d39d8836b4e704890220387ef5ea5f005a0d81
-
SSDEEP
3072:N4pDZeNaoQc78FRlFAzJvJHJZGY72RK6PDoYKkw:ODW78N+hGY7yh0Y
Static task
static1
Behavioral task
behavioral1
Sample
4f251a3c0b3f8b757b7d00fd45078d1d1cdae5cc08ce54110d2ba9b9269711ecN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4f251a3c0b3f8b757b7d00fd45078d1d1cdae5cc08ce54110d2ba9b9269711ecN.exe
-
Size
120KB
-
MD5
78fa5f605da24576bcfdd52ce9960400
-
SHA1
3465c6631791fd06c8b49cd97c6cf7f5440bda99
-
SHA256
4f251a3c0b3f8b757b7d00fd45078d1d1cdae5cc08ce54110d2ba9b9269711ec
-
SHA512
e5e369ca8b8de4568eba165471c143e51ca7de9bd1bb149fac1165c033a9050979af076e1df130be6b4c718ae3d39d8836b4e704890220387ef5ea5f005a0d81
-
SSDEEP
3072:N4pDZeNaoQc78FRlFAzJvJHJZGY72RK6PDoYKkw:ODW78N+hGY7yh0Y
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5