General
-
Target
49aea3ba4c04d1dd1c4774e7800d6f89e6668119cde35c90e4f13da50b07dbe8N.exe
-
Size
120KB
-
Sample
241216-qx8z5asnfk
-
MD5
3d22bc0d564f7213c176059fe3f64770
-
SHA1
02bc3d4d6dc72736fc3841942e689c6c5edfc2bc
-
SHA256
49aea3ba4c04d1dd1c4774e7800d6f89e6668119cde35c90e4f13da50b07dbe8
-
SHA512
1893ed0ceabffdad907803716919f6ea218a06032300e8f25c2d2f08c98e2f1407f7f21c081f592b3da1f3560a15da8ca1dd57a87c7f85c38944e47e719f7fd5
-
SSDEEP
3072:QsJpwB1TL+LjFIlAcAFRNN2e6USUhc/2QR:p+LqemzFRD2VUfhc+
Static task
static1
Behavioral task
behavioral1
Sample
49aea3ba4c04d1dd1c4774e7800d6f89e6668119cde35c90e4f13da50b07dbe8N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
49aea3ba4c04d1dd1c4774e7800d6f89e6668119cde35c90e4f13da50b07dbe8N.exe
-
Size
120KB
-
MD5
3d22bc0d564f7213c176059fe3f64770
-
SHA1
02bc3d4d6dc72736fc3841942e689c6c5edfc2bc
-
SHA256
49aea3ba4c04d1dd1c4774e7800d6f89e6668119cde35c90e4f13da50b07dbe8
-
SHA512
1893ed0ceabffdad907803716919f6ea218a06032300e8f25c2d2f08c98e2f1407f7f21c081f592b3da1f3560a15da8ca1dd57a87c7f85c38944e47e719f7fd5
-
SSDEEP
3072:QsJpwB1TL+LjFIlAcAFRNN2e6USUhc/2QR:p+LqemzFRD2VUfhc+
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5