General
-
Target
4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075N.exe
-
Size
120KB
-
Sample
241217-a2mdxswkfk
-
MD5
8e5ec00cc5b6f32d95bc647497f90560
-
SHA1
33db8f3a3997d4d608aaa49c95e404efb380f1f4
-
SHA256
4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075
-
SHA512
35dbe976475ad31aa63efadcdbeaa471f34c730b10f359dfebc57d3af43654e3a27295528b64714480b9e732bbea7ec980eacb31f608c9689caac07ddb4e2aa6
-
SSDEEP
3072:wm2CmkmaM/dxgc7GAujHMSe/w1NdW0lG:wmAtv/doFj8
Static task
static1
Behavioral task
behavioral1
Sample
4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075N.exe
-
Size
120KB
-
MD5
8e5ec00cc5b6f32d95bc647497f90560
-
SHA1
33db8f3a3997d4d608aaa49c95e404efb380f1f4
-
SHA256
4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075
-
SHA512
35dbe976475ad31aa63efadcdbeaa471f34c730b10f359dfebc57d3af43654e3a27295528b64714480b9e732bbea7ec980eacb31f608c9689caac07ddb4e2aa6
-
SSDEEP
3072:wm2CmkmaM/dxgc7GAujHMSe/w1NdW0lG:wmAtv/doFj8
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5