General
-
Target
4ac34f3c1ad9100f352aa94793761ec7831796f9e852043f9dfc059b5812acc4.exe
-
Size
120KB
-
Sample
241217-axgmwavmcv
-
MD5
df124f0f8532f7f6e2c47b07cc450515
-
SHA1
850e908dc553e413a21f105f755dc428b8431087
-
SHA256
4ac34f3c1ad9100f352aa94793761ec7831796f9e852043f9dfc059b5812acc4
-
SHA512
8bf481b02c4ba7da866f8414b41c3a7f7848f32dcf3e6044fff5dda97ad9ff60d5384bce647cf2737beb536f132c43a833fb6b0b59a20e298f0ff03a14bcf959
-
SSDEEP
1536:9+XAVGqWLB9T5FaxTxAhe7YV0ChBAYp1TWhzHM3R+ba/Lcla2BTZPRNTvqH:9+XAt0rLAAe7YV0ChBbdWVSgFPRNjqH
Static task
static1
Behavioral task
behavioral1
Sample
4ac34f3c1ad9100f352aa94793761ec7831796f9e852043f9dfc059b5812acc4.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4ac34f3c1ad9100f352aa94793761ec7831796f9e852043f9dfc059b5812acc4.exe
-
Size
120KB
-
MD5
df124f0f8532f7f6e2c47b07cc450515
-
SHA1
850e908dc553e413a21f105f755dc428b8431087
-
SHA256
4ac34f3c1ad9100f352aa94793761ec7831796f9e852043f9dfc059b5812acc4
-
SHA512
8bf481b02c4ba7da866f8414b41c3a7f7848f32dcf3e6044fff5dda97ad9ff60d5384bce647cf2737beb536f132c43a833fb6b0b59a20e298f0ff03a14bcf959
-
SSDEEP
1536:9+XAVGqWLB9T5FaxTxAhe7YV0ChBAYp1TWhzHM3R+ba/Lcla2BTZPRNTvqH:9+XAt0rLAAe7YV0ChBbdWVSgFPRNjqH
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5