General
-
Target
b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffcN.exe
-
Size
120KB
-
Sample
241216-xeb11aykgl
-
MD5
0b8f629eca974d071cfb9ffaab03db00
-
SHA1
6ddcdfc46129b655173d6e97911aff0af19e2881
-
SHA256
b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffc
-
SHA512
d7ed994e595d4c58aa91503052edb5769841e893a57a9378f7c25b773a56aa99138f2251ef0a53596ff1c9fa2d3f022078bc84e77f31caa2e02657075d2fba9c
-
SSDEEP
3072:XzlXR0z1ksvwdqvHNBdNJAyed7Y8yy+uRzSEua+gwd:Dlh0zX40vTdNq5dqmqOw
Static task
static1
Behavioral task
behavioral1
Sample
b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffcN.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffcN.exe
-
Size
120KB
-
MD5
0b8f629eca974d071cfb9ffaab03db00
-
SHA1
6ddcdfc46129b655173d6e97911aff0af19e2881
-
SHA256
b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffc
-
SHA512
d7ed994e595d4c58aa91503052edb5769841e893a57a9378f7c25b773a56aa99138f2251ef0a53596ff1c9fa2d3f022078bc84e77f31caa2e02657075d2fba9c
-
SSDEEP
3072:XzlXR0z1ksvwdqvHNBdNJAyed7Y8yy+uRzSEua+gwd:Dlh0zX40vTdNq5dqmqOw
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5