General
-
Target
33046d944ef5e45fc6d4c438f5e55d704c3a3c02f7e7c4e0e5812cecd1c31b87N.exe
-
Size
120KB
-
Sample
241216-rk413stjgr
-
MD5
ca857c65c74be7586d428534ff8e2550
-
SHA1
bfef2a4c283706975710dece2171879bdf206a7e
-
SHA256
33046d944ef5e45fc6d4c438f5e55d704c3a3c02f7e7c4e0e5812cecd1c31b87
-
SHA512
c2aca84c38905f0d1bd93b261fe71a41a5547a7881ed265f944df8c02c732416ffd5e098c7f88f7973eb4df5c906d36e6d71e144c8ad0c7fbcc95ff3d5e8d47b
-
SSDEEP
3072:asaMi91/70x+Wv29dJ/Ql9DZeNe4pQLw:altyt28lDme4p4w
Static task
static1
Behavioral task
behavioral1
Sample
33046d944ef5e45fc6d4c438f5e55d704c3a3c02f7e7c4e0e5812cecd1c31b87N.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
33046d944ef5e45fc6d4c438f5e55d704c3a3c02f7e7c4e0e5812cecd1c31b87N.exe
-
Size
120KB
-
MD5
ca857c65c74be7586d428534ff8e2550
-
SHA1
bfef2a4c283706975710dece2171879bdf206a7e
-
SHA256
33046d944ef5e45fc6d4c438f5e55d704c3a3c02f7e7c4e0e5812cecd1c31b87
-
SHA512
c2aca84c38905f0d1bd93b261fe71a41a5547a7881ed265f944df8c02c732416ffd5e098c7f88f7973eb4df5c906d36e6d71e144c8ad0c7fbcc95ff3d5e8d47b
-
SSDEEP
3072:asaMi91/70x+Wv29dJ/Ql9DZeNe4pQLw:altyt28lDme4p4w
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5