General
-
Target
80bf17ea5e1317c79c77bdd29497b5fb9cefb491b8925d5fc3510b9e6ef43cd6N.exe
-
Size
120KB
-
Sample
241216-rsmf1atlcn
-
MD5
fec24fa3a4800a7f22475dc19ff524a0
-
SHA1
5661f8c529a7d5ea06a0faa30e8d610a11e32230
-
SHA256
80bf17ea5e1317c79c77bdd29497b5fb9cefb491b8925d5fc3510b9e6ef43cd6
-
SHA512
4eb4f8e906213b847a98cb50b40a254f5fef54d3191f3a63f343738aabe5eb870cc42000fdd3ccee064ec2abdb1cb926f83810338e63a7e4572ee2a239b5de95
-
SSDEEP
3072:rb7RgBj5eTiKqmI42hjVc3r7aDqYeKtV+j2MNJ:rfUEOdmMtVKr1YeSVdMN
Static task
static1
Behavioral task
behavioral1
Sample
80bf17ea5e1317c79c77bdd29497b5fb9cefb491b8925d5fc3510b9e6ef43cd6N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
80bf17ea5e1317c79c77bdd29497b5fb9cefb491b8925d5fc3510b9e6ef43cd6N.exe
-
Size
120KB
-
MD5
fec24fa3a4800a7f22475dc19ff524a0
-
SHA1
5661f8c529a7d5ea06a0faa30e8d610a11e32230
-
SHA256
80bf17ea5e1317c79c77bdd29497b5fb9cefb491b8925d5fc3510b9e6ef43cd6
-
SHA512
4eb4f8e906213b847a98cb50b40a254f5fef54d3191f3a63f343738aabe5eb870cc42000fdd3ccee064ec2abdb1cb926f83810338e63a7e4572ee2a239b5de95
-
SSDEEP
3072:rb7RgBj5eTiKqmI42hjVc3r7aDqYeKtV+j2MNJ:rfUEOdmMtVKr1YeSVdMN
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5