General
-
Target
45249cfff0b7af97e8ed9805c958dfb9deac6e5c753515adedbc281fd9f5147eN.exe
-
Size
120KB
-
Sample
241216-l8lazswkfv
-
MD5
4e0c01ce0f7f22df85983fefb2210670
-
SHA1
7071c9798ee79bd0e727104c6dcc4d90eb486859
-
SHA256
45249cfff0b7af97e8ed9805c958dfb9deac6e5c753515adedbc281fd9f5147e
-
SHA512
653c6a07c7651666ad679619e246e55f635a49c87b03a4a4a98110096605dd5168e196efe0fd3b8bac727c5faa8872c3400152b633007273d9b7395e27dd2e8a
-
SSDEEP
3072:ESzGzuoOpu+W+nZo4fBJfuA8wIMCbrYAtUXmY:9GSoph+n+a7h8THYAgm
Static task
static1
Behavioral task
behavioral1
Sample
45249cfff0b7af97e8ed9805c958dfb9deac6e5c753515adedbc281fd9f5147eN.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
45249cfff0b7af97e8ed9805c958dfb9deac6e5c753515adedbc281fd9f5147eN.exe
-
Size
120KB
-
MD5
4e0c01ce0f7f22df85983fefb2210670
-
SHA1
7071c9798ee79bd0e727104c6dcc4d90eb486859
-
SHA256
45249cfff0b7af97e8ed9805c958dfb9deac6e5c753515adedbc281fd9f5147e
-
SHA512
653c6a07c7651666ad679619e246e55f635a49c87b03a4a4a98110096605dd5168e196efe0fd3b8bac727c5faa8872c3400152b633007273d9b7395e27dd2e8a
-
SSDEEP
3072:ESzGzuoOpu+W+nZo4fBJfuA8wIMCbrYAtUXmY:9GSoph+n+a7h8THYAgm
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5