General
-
Target
d95ffeef2ee17cb3cffa686965abe0f6952c6114a5e32dc9608f599173d19b33.exe
-
Size
120KB
-
Sample
241217-awzr3avmaz
-
MD5
af3bd7b9ed9f66a45b296153b063744b
-
SHA1
1c9c0df877f9e1db328a937ba0af04a7df2647a5
-
SHA256
d95ffeef2ee17cb3cffa686965abe0f6952c6114a5e32dc9608f599173d19b33
-
SHA512
88595b4afda5b1a8f367efbfefe2568fc1b4b517dadf3e3be651fb0b00dba8ee81c26eed128dc4c59e8ac84e4f6e2edc255821c34a4a99301729818e51bb95ef
-
SSDEEP
1536:Kb0z4LBLw+XWZV5AAsjEZDEQIJa6Q2lo9tsjofkp9VQPf+kkwc4L/iSzkZsE8:Kb9w++V5+QIPQmoXtw9VWf+JqDB
Static task
static1
Behavioral task
behavioral1
Sample
d95ffeef2ee17cb3cffa686965abe0f6952c6114a5e32dc9608f599173d19b33.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d95ffeef2ee17cb3cffa686965abe0f6952c6114a5e32dc9608f599173d19b33.exe
-
Size
120KB
-
MD5
af3bd7b9ed9f66a45b296153b063744b
-
SHA1
1c9c0df877f9e1db328a937ba0af04a7df2647a5
-
SHA256
d95ffeef2ee17cb3cffa686965abe0f6952c6114a5e32dc9608f599173d19b33
-
SHA512
88595b4afda5b1a8f367efbfefe2568fc1b4b517dadf3e3be651fb0b00dba8ee81c26eed128dc4c59e8ac84e4f6e2edc255821c34a4a99301729818e51bb95ef
-
SSDEEP
1536:Kb0z4LBLw+XWZV5AAsjEZDEQIJa6Q2lo9tsjofkp9VQPf+kkwc4L/iSzkZsE8:Kb9w++V5+QIPQmoXtw9VWf+JqDB
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5