General
-
Target
1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816N.exe
-
Size
120KB
-
Sample
241216-p2zrks1qgm
-
MD5
ad3bb5b5eb9532a608162e96f0747400
-
SHA1
3188eb793636086063f5f4ed7ef95470165ed304
-
SHA256
1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816
-
SHA512
f707612ff2353cfc9006234df20d1f05e985fbdc69e8d0723757652ab762da7c2a5599f5af146c72876252af54fe09bb275afc54e3b5ca52ca5feaf68faa3067
-
SSDEEP
3072:BJplVcWRZmUhZTVzU61uSGNgRfVyxMnV84FF80:vpbck3yquSGNusMnPX
Static task
static1
Behavioral task
behavioral1
Sample
1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816N.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816N.exe
-
Size
120KB
-
MD5
ad3bb5b5eb9532a608162e96f0747400
-
SHA1
3188eb793636086063f5f4ed7ef95470165ed304
-
SHA256
1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816
-
SHA512
f707612ff2353cfc9006234df20d1f05e985fbdc69e8d0723757652ab762da7c2a5599f5af146c72876252af54fe09bb275afc54e3b5ca52ca5feaf68faa3067
-
SSDEEP
3072:BJplVcWRZmUhZTVzU61uSGNgRfVyxMnV84FF80:vpbck3yquSGNusMnPX
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5