General
-
Target
17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6N.exe
-
Size
120KB
-
Sample
241216-th2jaavkbt
-
MD5
b62f4ec5a78589c8d325142b4e81c690
-
SHA1
b631b404b98d6c78cc1a05b7ba2e219d014c2682
-
SHA256
17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6
-
SHA512
c77a1142e727d702048cdf5eb19d10fb0cd905677dd351a0e25c27cc8833dcfcb163d6189e8c73b74dc14898911d782394cd9f9c377dd4b60d6f892dc384632e
-
SSDEEP
1536:8WDRPN7k//Mf7V9m2ng8YBYFV916XCzPvKGm30gWoCkxDAbsv8b:8W1PNYeHnhYBOWsvKv/fjDAgU
Static task
static1
Behavioral task
behavioral1
Sample
17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6N.exe
-
Size
120KB
-
MD5
b62f4ec5a78589c8d325142b4e81c690
-
SHA1
b631b404b98d6c78cc1a05b7ba2e219d014c2682
-
SHA256
17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6
-
SHA512
c77a1142e727d702048cdf5eb19d10fb0cd905677dd351a0e25c27cc8833dcfcb163d6189e8c73b74dc14898911d782394cd9f9c377dd4b60d6f892dc384632e
-
SSDEEP
1536:8WDRPN7k//Mf7V9m2ng8YBYFV916XCzPvKGm30gWoCkxDAbsv8b:8W1PNYeHnhYBOWsvKv/fjDAgU
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5