General
-
Target
be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0fN.exe
-
Size
120KB
-
Sample
241216-hm6g9ayqdw
-
MD5
e6046419ecfbcc2358d66df1f7240760
-
SHA1
e518f354cf4559aa56ac2822f34af73540cf944d
-
SHA256
be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0f
-
SHA512
bda8fd37375225db54f978cfacb4ec3eb0be206ab7b9d19675b971c6f24e06056b8a6f51b6c44b14619e23816cc8b9ff3ef62381bc1cd3f349b12e8ed1fc7205
-
SSDEEP
1536:KIwjKKWa2r6U1dVKpQ/uc/RHPX2z1l6EKcXMMsKEo+NrpOlaEcRIX2Z:KIwd2hJK+T/JPmzeEKc/sKsro1c2m
Static task
static1
Behavioral task
behavioral1
Sample
be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0fN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0fN.exe
-
Size
120KB
-
MD5
e6046419ecfbcc2358d66df1f7240760
-
SHA1
e518f354cf4559aa56ac2822f34af73540cf944d
-
SHA256
be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0f
-
SHA512
bda8fd37375225db54f978cfacb4ec3eb0be206ab7b9d19675b971c6f24e06056b8a6f51b6c44b14619e23816cc8b9ff3ef62381bc1cd3f349b12e8ed1fc7205
-
SSDEEP
1536:KIwjKKWa2r6U1dVKpQ/uc/RHPX2z1l6EKcXMMsKEo+NrpOlaEcRIX2Z:KIwd2hJK+T/JPmzeEKc/sKsro1c2m
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5