General
-
Target
d0d98512e7845fcd88e517da3b89ced172717cefccc73aea3079cd2a59327867N.exe
-
Size
120KB
-
Sample
241216-sy4sxavlcr
-
MD5
2430178886e043a84a0685848cfcb7c0
-
SHA1
d553adc6ea4ca67330af17cc5b78a1e954549341
-
SHA256
d0d98512e7845fcd88e517da3b89ced172717cefccc73aea3079cd2a59327867
-
SHA512
67d5dc665df4a5dfcd1260f2a4b4d1df6848384ac164471a6c6d88a19c26dfdc5f214658254ffbab7874d8647a1fb45ee1809de694fa975322b192f3fea68f33
-
SSDEEP
3072:zTkWJE2cGzYNYCNcqy3j0jqXgtUM+RmTwb:PvEvNcqy3jiWMKmTK
Static task
static1
Behavioral task
behavioral1
Sample
d0d98512e7845fcd88e517da3b89ced172717cefccc73aea3079cd2a59327867N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d0d98512e7845fcd88e517da3b89ced172717cefccc73aea3079cd2a59327867N.exe
-
Size
120KB
-
MD5
2430178886e043a84a0685848cfcb7c0
-
SHA1
d553adc6ea4ca67330af17cc5b78a1e954549341
-
SHA256
d0d98512e7845fcd88e517da3b89ced172717cefccc73aea3079cd2a59327867
-
SHA512
67d5dc665df4a5dfcd1260f2a4b4d1df6848384ac164471a6c6d88a19c26dfdc5f214658254ffbab7874d8647a1fb45ee1809de694fa975322b192f3fea68f33
-
SSDEEP
3072:zTkWJE2cGzYNYCNcqy3j0jqXgtUM+RmTwb:PvEvNcqy3jiWMKmTK
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5