General
-
Target
3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3baN.exe
-
Size
120KB
-
Sample
241216-vdhq2svrhs
-
MD5
0c4a116fc620b012ac790d5a6e98be90
-
SHA1
cf172028a24a62abe88a9d93acd7f46b16bd7e6d
-
SHA256
3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3ba
-
SHA512
ba341f43d573d5655eb1525dbec4a219580565165036d4b639b675fc5f76ae4c031654d30b493d2043f14bf67b6cf1c2f8eed633efdf02fe6552a87bca3aa828
-
SSDEEP
3072:2fpCIotX4cGchu1yaUP3eBpKwggnFEOTw6WUEHl7B:2fYNB40JFApMOTw6WUEHl7
Static task
static1
Behavioral task
behavioral1
Sample
3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3baN.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3baN.exe
-
Size
120KB
-
MD5
0c4a116fc620b012ac790d5a6e98be90
-
SHA1
cf172028a24a62abe88a9d93acd7f46b16bd7e6d
-
SHA256
3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3ba
-
SHA512
ba341f43d573d5655eb1525dbec4a219580565165036d4b639b675fc5f76ae4c031654d30b493d2043f14bf67b6cf1c2f8eed633efdf02fe6552a87bca3aa828
-
SSDEEP
3072:2fpCIotX4cGchu1yaUP3eBpKwggnFEOTw6WUEHl7B:2fYNB40JFApMOTw6WUEHl7
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5