General
-
Target
beb50d6da3a517e9e5c0c56b2e027174ef39ce1bd4eeaea00c3409b5b6be1f15N.exe
-
Size
120KB
-
Sample
241216-tdbr3avpcr
-
MD5
a728010e1814a33f5293e1e7d9c3a3a0
-
SHA1
6178a570715c8319605fe1e3a021a1d7e0682fac
-
SHA256
beb50d6da3a517e9e5c0c56b2e027174ef39ce1bd4eeaea00c3409b5b6be1f15
-
SHA512
bc2b056600f00bd678113f5e40d31cca416de1018b4d9b81d092f52e6b5ed98f68bdcd9c6d16aeb2825bfeab6ca67100ef75e6fde0dd0626c770d5754ba9e53a
-
SSDEEP
1536:o3aw756N+3a69lhDV9g2fbm+TMzgJEeaKWhVr/z5SF0dhRpcd2Eg1DaRkr9um2wl:2BhZJDfiIA/bKS7gFUhRCB2aRkRgv0
Static task
static1
Behavioral task
behavioral1
Sample
beb50d6da3a517e9e5c0c56b2e027174ef39ce1bd4eeaea00c3409b5b6be1f15N.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
beb50d6da3a517e9e5c0c56b2e027174ef39ce1bd4eeaea00c3409b5b6be1f15N.exe
-
Size
120KB
-
MD5
a728010e1814a33f5293e1e7d9c3a3a0
-
SHA1
6178a570715c8319605fe1e3a021a1d7e0682fac
-
SHA256
beb50d6da3a517e9e5c0c56b2e027174ef39ce1bd4eeaea00c3409b5b6be1f15
-
SHA512
bc2b056600f00bd678113f5e40d31cca416de1018b4d9b81d092f52e6b5ed98f68bdcd9c6d16aeb2825bfeab6ca67100ef75e6fde0dd0626c770d5754ba9e53a
-
SSDEEP
1536:o3aw756N+3a69lhDV9g2fbm+TMzgJEeaKWhVr/z5SF0dhRpcd2Eg1DaRkr9um2wl:2BhZJDfiIA/bKS7gFUhRCB2aRkRgv0
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5