General
-
Target
ce33a0bcf564fbb67870e22e48a27b4058d3a99be052422cfedf666fcdd12bdfN.exe
-
Size
120KB
-
Sample
241216-mktg5axpbj
-
MD5
4a182cd374806508076fa58e7899dde0
-
SHA1
393456ac34e9a698d8fbb06ac2e142db7c88b1d1
-
SHA256
ce33a0bcf564fbb67870e22e48a27b4058d3a99be052422cfedf666fcdd12bdf
-
SHA512
8190b11243e91a0bb7b4e22012c3b348602fb8a955d4f25a56dd72fa83b4556b63dde3bd87bfe29a66040d41d481b26f699281dba2c2459150b127dd284db567
-
SSDEEP
3072:wu9tprWQ7XmjBbBHOFXvkaRr83KgceqCt2nwpOre:wu9T5cB1uFXvkadgcHa0wpO
Static task
static1
Behavioral task
behavioral1
Sample
ce33a0bcf564fbb67870e22e48a27b4058d3a99be052422cfedf666fcdd12bdfN.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ce33a0bcf564fbb67870e22e48a27b4058d3a99be052422cfedf666fcdd12bdfN.exe
-
Size
120KB
-
MD5
4a182cd374806508076fa58e7899dde0
-
SHA1
393456ac34e9a698d8fbb06ac2e142db7c88b1d1
-
SHA256
ce33a0bcf564fbb67870e22e48a27b4058d3a99be052422cfedf666fcdd12bdf
-
SHA512
8190b11243e91a0bb7b4e22012c3b348602fb8a955d4f25a56dd72fa83b4556b63dde3bd87bfe29a66040d41d481b26f699281dba2c2459150b127dd284db567
-
SSDEEP
3072:wu9tprWQ7XmjBbBHOFXvkaRr83KgceqCt2nwpOre:wu9T5cB1uFXvkadgcHa0wpO
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5