General
-
Target
fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86N.exe
-
Size
120KB
-
Sample
241216-s4smtstqax
-
MD5
30a2019884656acab2844b40ace20a00
-
SHA1
d961f9a7ae685bbcef04a85d28ca0c9fc44c8e04
-
SHA256
fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86
-
SHA512
0a087d0609c2277b22d2e4ae92174edf7f6292ae554e024aeff910184c6a541900fb7663d46fefcecb6d589c3a371f4a512353c2e1c412efb83579d5526ffb9e
-
SSDEEP
3072:eqXEauoHYor0Non86nmAeLS8qe6orY/e4:xrYorHOmVe4
Static task
static1
Behavioral task
behavioral1
Sample
fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86N.exe
-
Size
120KB
-
MD5
30a2019884656acab2844b40ace20a00
-
SHA1
d961f9a7ae685bbcef04a85d28ca0c9fc44c8e04
-
SHA256
fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86
-
SHA512
0a087d0609c2277b22d2e4ae92174edf7f6292ae554e024aeff910184c6a541900fb7663d46fefcecb6d589c3a371f4a512353c2e1c412efb83579d5526ffb9e
-
SSDEEP
3072:eqXEauoHYor0Non86nmAeLS8qe6orY/e4:xrYorHOmVe4
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5