General
-
Target
2847a233b6ad1764935566be8c4601118959dd99211b82e064312d81607eb058N.exe
-
Size
120KB
-
Sample
241216-j2avkaspgp
-
MD5
a16c834b785e11027d59b3aa6639aef0
-
SHA1
9c957ad19168423dff391d8bbb485b1faddb42d7
-
SHA256
2847a233b6ad1764935566be8c4601118959dd99211b82e064312d81607eb058
-
SHA512
74c30bed7239809f96c10a6e8194deaaf0d396aa7fbf385670f6245ee2685e367a1b916c9c70f1574d3e1f436d6925530eac2375d882b7c82380a8227dee05f7
-
SSDEEP
1536:EUs+xoW6dvio2U6rZIAfj2RQMeo8GMc4gMA4B1UZlcGVC+198co25jcwuzeVMP49:xkio/vRyo8zAq1Us5+q25Qwua
Static task
static1
Behavioral task
behavioral1
Sample
2847a233b6ad1764935566be8c4601118959dd99211b82e064312d81607eb058N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2847a233b6ad1764935566be8c4601118959dd99211b82e064312d81607eb058N.exe
-
Size
120KB
-
MD5
a16c834b785e11027d59b3aa6639aef0
-
SHA1
9c957ad19168423dff391d8bbb485b1faddb42d7
-
SHA256
2847a233b6ad1764935566be8c4601118959dd99211b82e064312d81607eb058
-
SHA512
74c30bed7239809f96c10a6e8194deaaf0d396aa7fbf385670f6245ee2685e367a1b916c9c70f1574d3e1f436d6925530eac2375d882b7c82380a8227dee05f7
-
SSDEEP
1536:EUs+xoW6dvio2U6rZIAfj2RQMeo8GMc4gMA4B1UZlcGVC+198co25jcwuzeVMP49:xkio/vRyo8zAq1Us5+q25Qwua
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5