General
-
Target
a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28eN.exe
-
Size
120KB
-
Sample
241217-a5brlawldp
-
MD5
24ee250e7450d64727446d0cc9435ab0
-
SHA1
a4a7bc2720dfdd69a44872f42fd490c7cedcbd42
-
SHA256
a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28e
-
SHA512
d083b658e2e6e019355ae430c6f6f0d60b5e7eda0b5698497aecd7c37ea867d990dd12442a4d6320c0373a84ca85970d23c7266dc0deab02a3e94a826798ded5
-
SSDEEP
1536:P7cgpmQC8GP1gRG924QYSPzMBLxdLgekKUB/AXSl+p2qKAtHp8iFy+eMCJBh:Jz1GGRwQYSoxdgekHKil42VANp1F0h
Static task
static1
Behavioral task
behavioral1
Sample
a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28eN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28eN.exe
-
Size
120KB
-
MD5
24ee250e7450d64727446d0cc9435ab0
-
SHA1
a4a7bc2720dfdd69a44872f42fd490c7cedcbd42
-
SHA256
a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28e
-
SHA512
d083b658e2e6e019355ae430c6f6f0d60b5e7eda0b5698497aecd7c37ea867d990dd12442a4d6320c0373a84ca85970d23c7266dc0deab02a3e94a826798ded5
-
SSDEEP
1536:P7cgpmQC8GP1gRG924QYSPzMBLxdLgekKUB/AXSl+p2qKAtHp8iFy+eMCJBh:Jz1GGRwQYSoxdgekHKil42VANp1F0h
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5