General
-
Target
d12125a56c44fcda895ddc32c8f42ff3591cb41cf875c2b0b1518f84dd6ade24N.exe
-
Size
120KB
-
Sample
241217-asl2ssvrcp
-
MD5
7273e31507846020411e1197e924bda0
-
SHA1
c9b76bc7169132b99b7e7b34e20d7c1e6291d9aa
-
SHA256
d12125a56c44fcda895ddc32c8f42ff3591cb41cf875c2b0b1518f84dd6ade24
-
SHA512
e9a44e756247cddbf36fe4336763000286f4a681af4cbf8a0bbcf34b97243ddabab8c92a5b89a0cb4daacc577f019f1a0f8ed98a9ee88feac0b72cbce6b3d662
-
SSDEEP
3072:n9Bbr5vUkIVK4oaTuOz7iPouoQBangsPyO44E:njbr5cznay7Ivag6y
Static task
static1
Behavioral task
behavioral1
Sample
d12125a56c44fcda895ddc32c8f42ff3591cb41cf875c2b0b1518f84dd6ade24N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d12125a56c44fcda895ddc32c8f42ff3591cb41cf875c2b0b1518f84dd6ade24N.exe
-
Size
120KB
-
MD5
7273e31507846020411e1197e924bda0
-
SHA1
c9b76bc7169132b99b7e7b34e20d7c1e6291d9aa
-
SHA256
d12125a56c44fcda895ddc32c8f42ff3591cb41cf875c2b0b1518f84dd6ade24
-
SHA512
e9a44e756247cddbf36fe4336763000286f4a681af4cbf8a0bbcf34b97243ddabab8c92a5b89a0cb4daacc577f019f1a0f8ed98a9ee88feac0b72cbce6b3d662
-
SSDEEP
3072:n9Bbr5vUkIVK4oaTuOz7iPouoQBangsPyO44E:njbr5cznay7Ivag6y
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5