General
-
Target
ba69dcf3d16a5073f337793f87f11ad8c6512da7edac33bb6f4216d6c1c3fc9aN.exe
-
Size
120KB
-
Sample
241216-xb9g4aykcq
-
MD5
f3343ec7567bb798e6168f380a6cca70
-
SHA1
03e1a2f2f9ddffb33f0a5fe0d9822b508157674a
-
SHA256
ba69dcf3d16a5073f337793f87f11ad8c6512da7edac33bb6f4216d6c1c3fc9a
-
SHA512
221e7366c493fc924d10fb381cf6a9a6aff7d2245af85e0d2e082869eb0b5f7f871318444215302e0b5c5fa62d3540836f73e3d636a8c5b948a00a337f777a19
-
SSDEEP
3072:mrzjmn2XzoaVBe7eyEa4EahUy00Nvlv5q:mrzjmn2Xo+Z300NB5
Static task
static1
Behavioral task
behavioral1
Sample
ba69dcf3d16a5073f337793f87f11ad8c6512da7edac33bb6f4216d6c1c3fc9aN.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ba69dcf3d16a5073f337793f87f11ad8c6512da7edac33bb6f4216d6c1c3fc9aN.exe
-
Size
120KB
-
MD5
f3343ec7567bb798e6168f380a6cca70
-
SHA1
03e1a2f2f9ddffb33f0a5fe0d9822b508157674a
-
SHA256
ba69dcf3d16a5073f337793f87f11ad8c6512da7edac33bb6f4216d6c1c3fc9a
-
SHA512
221e7366c493fc924d10fb381cf6a9a6aff7d2245af85e0d2e082869eb0b5f7f871318444215302e0b5c5fa62d3540836f73e3d636a8c5b948a00a337f777a19
-
SSDEEP
3072:mrzjmn2XzoaVBe7eyEa4EahUy00Nvlv5q:mrzjmn2Xo+Z300NB5
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5