General
-
Target
a702a9b8489310241e6422d549d74c3a5111db1442664db56c84efd320ee2658N.exe
-
Size
120KB
-
Sample
241217-aje7wsvjbx
-
MD5
868e82cd86751fe40fec83e83d7c2860
-
SHA1
3d10cd4c016f05898aac78c3adf0025641020500
-
SHA256
a702a9b8489310241e6422d549d74c3a5111db1442664db56c84efd320ee2658
-
SHA512
ec988dfd2f2fb5e23346495f8c5bc4d1bc814a43c9f9faeb8cf073aaf4d764af13dde8d99941f8b7664a5e4f1a36ef0cb04c1b86eca187acd2db8333f17c2c64
-
SSDEEP
3072:WmXyEbYH27rTCSLubNkfumapbvn0bTrW:W/NzP7jn0bTrW
Static task
static1
Behavioral task
behavioral1
Sample
a702a9b8489310241e6422d549d74c3a5111db1442664db56c84efd320ee2658N.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a702a9b8489310241e6422d549d74c3a5111db1442664db56c84efd320ee2658N.exe
-
Size
120KB
-
MD5
868e82cd86751fe40fec83e83d7c2860
-
SHA1
3d10cd4c016f05898aac78c3adf0025641020500
-
SHA256
a702a9b8489310241e6422d549d74c3a5111db1442664db56c84efd320ee2658
-
SHA512
ec988dfd2f2fb5e23346495f8c5bc4d1bc814a43c9f9faeb8cf073aaf4d764af13dde8d99941f8b7664a5e4f1a36ef0cb04c1b86eca187acd2db8333f17c2c64
-
SSDEEP
3072:WmXyEbYH27rTCSLubNkfumapbvn0bTrW:W/NzP7jn0bTrW
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5