General
-
Target
e96da67d9a19f5d0e91c6b518f8a199be7975472ce5e9864069bcc998f1c339cN.exe
-
Size
120KB
-
Sample
241216-vft7vswnhp
-
MD5
bf807a8cc20bdabba515204ded550ad0
-
SHA1
708b9e3df579c5204d03a8be538fd0d9ad2ce3a1
-
SHA256
e96da67d9a19f5d0e91c6b518f8a199be7975472ce5e9864069bcc998f1c339c
-
SHA512
af0471279d01a6ed39cba2453d068279f87a2111f8b7fc292341bea538c30065771aab74ea2c20f8c2a3d7fdb139c5c998a35a450f895d515ff64f03539d37e5
-
SSDEEP
1536:JzMPjom7t+62n/RL41uxOA9S4ss8VNj59OAqyGhib8l1jJDqULDeFclRODqWbK:JzSf7tNS5LkGIV9OACib8rJMilROeSK
Static task
static1
Behavioral task
behavioral1
Sample
e96da67d9a19f5d0e91c6b518f8a199be7975472ce5e9864069bcc998f1c339cN.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e96da67d9a19f5d0e91c6b518f8a199be7975472ce5e9864069bcc998f1c339cN.exe
-
Size
120KB
-
MD5
bf807a8cc20bdabba515204ded550ad0
-
SHA1
708b9e3df579c5204d03a8be538fd0d9ad2ce3a1
-
SHA256
e96da67d9a19f5d0e91c6b518f8a199be7975472ce5e9864069bcc998f1c339c
-
SHA512
af0471279d01a6ed39cba2453d068279f87a2111f8b7fc292341bea538c30065771aab74ea2c20f8c2a3d7fdb139c5c998a35a450f895d515ff64f03539d37e5
-
SSDEEP
1536:JzMPjom7t+62n/RL41uxOA9S4ss8VNj59OAqyGhib8l1jJDqULDeFclRODqWbK:JzSf7tNS5LkGIV9OACib8rJMilROeSK
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5