General
-
Target
83f9f1cd4b25aa29f5e16cc4653e9abf5829b66834432b73efe08dd11f8af982N.exe
-
Size
120KB
-
Sample
241216-p2d5wa1qfp
-
MD5
0296f4c4571770a27ef47e6e9ebb77c0
-
SHA1
4767d5c5d0403b5391f10d8d894facb5998904c1
-
SHA256
83f9f1cd4b25aa29f5e16cc4653e9abf5829b66834432b73efe08dd11f8af982
-
SHA512
6805de5110e3bb42386ea2200587efae27f7edab8ec604dc2098db1f844fca56354debe03b62814d0b78f464b6dbb19867c8efa546b0e2e90840e0f409993e6e
-
SSDEEP
1536:oIk4YHGQqSawz/sYmZ1E3Hr88kJ408qEFCaEb/wf/8tfNMhnhILQIG2EzH6:a4Hv7wLs5QAEObof//nhILQIgH6
Static task
static1
Behavioral task
behavioral1
Sample
83f9f1cd4b25aa29f5e16cc4653e9abf5829b66834432b73efe08dd11f8af982N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
83f9f1cd4b25aa29f5e16cc4653e9abf5829b66834432b73efe08dd11f8af982N.exe
-
Size
120KB
-
MD5
0296f4c4571770a27ef47e6e9ebb77c0
-
SHA1
4767d5c5d0403b5391f10d8d894facb5998904c1
-
SHA256
83f9f1cd4b25aa29f5e16cc4653e9abf5829b66834432b73efe08dd11f8af982
-
SHA512
6805de5110e3bb42386ea2200587efae27f7edab8ec604dc2098db1f844fca56354debe03b62814d0b78f464b6dbb19867c8efa546b0e2e90840e0f409993e6e
-
SSDEEP
1536:oIk4YHGQqSawz/sYmZ1E3Hr88kJ408qEFCaEb/wf/8tfNMhnhILQIG2EzH6:a4Hv7wLs5QAEObof//nhILQIgH6
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5