General
-
Target
e4723a71c7c75bf19dd16b738215346e73a3e6153ced2b2ff75b6cdeff029574N.exe
-
Size
120KB
-
Sample
241217-2g6eva1jez
-
MD5
339ae827e68ec56039e63430bf8a94a0
-
SHA1
53bfdc3d5a8799651b3e5108c1aaf3b662facb4d
-
SHA256
e4723a71c7c75bf19dd16b738215346e73a3e6153ced2b2ff75b6cdeff029574
-
SHA512
b73379792fbe51b87420579e8e5b954d35bf3667c55a44f9816315006ff6f0255273c82390a6f21a731adb4422e2123f4e87e83e61cf8e891f74d0bac76bc69a
-
SSDEEP
3072:Z8uNklEpmdravCSd/whrcqAB2JTOnkdNPrEhvwUS:Z8nl1sCSJOr+BCOA0vI
Static task
static1
Behavioral task
behavioral1
Sample
e4723a71c7c75bf19dd16b738215346e73a3e6153ced2b2ff75b6cdeff029574N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e4723a71c7c75bf19dd16b738215346e73a3e6153ced2b2ff75b6cdeff029574N.exe
-
Size
120KB
-
MD5
339ae827e68ec56039e63430bf8a94a0
-
SHA1
53bfdc3d5a8799651b3e5108c1aaf3b662facb4d
-
SHA256
e4723a71c7c75bf19dd16b738215346e73a3e6153ced2b2ff75b6cdeff029574
-
SHA512
b73379792fbe51b87420579e8e5b954d35bf3667c55a44f9816315006ff6f0255273c82390a6f21a731adb4422e2123f4e87e83e61cf8e891f74d0bac76bc69a
-
SSDEEP
3072:Z8uNklEpmdravCSd/whrcqAB2JTOnkdNPrEhvwUS:Z8nl1sCSJOr+BCOA0vI
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5