General
-
Target
cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0N.exe
-
Size
654KB
-
Sample
241217-116dhs1lcj
-
MD5
16251f7e20b5c6d2aa9db0e0fa96a2d0
-
SHA1
4c00272ddf2e4f7f320d7cf8cf59b5dd678e9a65
-
SHA256
cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0
-
SHA512
16b77f5e4a8a4a7086a2a4a55e690ec5c14e809bc8fdec90c83afba606d931bef79f5ceef42a32044611995ad2ed01e47e8c29b191a47a1bcf62eb388d0dbe15
-
SSDEEP
12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1E:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYE
Static task
static1
Behavioral task
behavioral1
Sample
cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0N.exe
-
Size
654KB
-
MD5
16251f7e20b5c6d2aa9db0e0fa96a2d0
-
SHA1
4c00272ddf2e4f7f320d7cf8cf59b5dd678e9a65
-
SHA256
cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0
-
SHA512
16b77f5e4a8a4a7086a2a4a55e690ec5c14e809bc8fdec90c83afba606d931bef79f5ceef42a32044611995ad2ed01e47e8c29b191a47a1bcf62eb388d0dbe15
-
SSDEEP
12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1E:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYE
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5