General
-
Target
ee83ecada5a980488b223caaa9c6c56666ca78986d44b46e68abfcfd156f8b5cN.exe
-
Size
120KB
-
Sample
241216-l5nlyawrdr
-
MD5
843c2e02254dc094a2fb510d49377b90
-
SHA1
478bb7a95b830343f854d86ebb8785d8fd7091e8
-
SHA256
ee83ecada5a980488b223caaa9c6c56666ca78986d44b46e68abfcfd156f8b5c
-
SHA512
c9018916c69f5a2e89e0bdfd877fd1c32296a21bef683addb10babc1bf55f9256d7f9127a8a9411b2eece2d379cadc40679073c2428d4a60026de3000b8a5eab
-
SSDEEP
3072:XlpT5umzys22RT2a71E2p2QND9I3B5YT:XJw2RT2ZglJI3B5
Static task
static1
Behavioral task
behavioral1
Sample
ee83ecada5a980488b223caaa9c6c56666ca78986d44b46e68abfcfd156f8b5cN.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ee83ecada5a980488b223caaa9c6c56666ca78986d44b46e68abfcfd156f8b5cN.exe
-
Size
120KB
-
MD5
843c2e02254dc094a2fb510d49377b90
-
SHA1
478bb7a95b830343f854d86ebb8785d8fd7091e8
-
SHA256
ee83ecada5a980488b223caaa9c6c56666ca78986d44b46e68abfcfd156f8b5c
-
SHA512
c9018916c69f5a2e89e0bdfd877fd1c32296a21bef683addb10babc1bf55f9256d7f9127a8a9411b2eece2d379cadc40679073c2428d4a60026de3000b8a5eab
-
SSDEEP
3072:XlpT5umzys22RT2a71E2p2QND9I3B5YT:XJw2RT2ZglJI3B5
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5