General
-
Target
e0e0c720266d220e06b71da27584b5498a7f81a78f1a719c59e9dce39b1c4d1cN.exe
-
Size
120KB
-
Sample
241217-azxf4swkbm
-
MD5
8ace0d77c251b39a68cc37401b68f090
-
SHA1
fe9d047029f151d623fdd429f5061f609289bcc6
-
SHA256
e0e0c720266d220e06b71da27584b5498a7f81a78f1a719c59e9dce39b1c4d1c
-
SHA512
bfd3e9536523f7fa2d39360ae90d02c3342742475eabafc5f4b4d0aba6de88e966051ad26ac09e97b729760aaf5dac206ed6da4661a14c04096dbf11aec3becc
-
SSDEEP
1536:o7Z4VI2TAz8aRRGoVrI2x1q6sYBngcYCkPecOI/vFsKKHIOBxUaM3HJ5FEiSYkJV:oi8BcoVrNbqkpgP5KHD1eHJrEwkDL
Static task
static1
Behavioral task
behavioral1
Sample
e0e0c720266d220e06b71da27584b5498a7f81a78f1a719c59e9dce39b1c4d1cN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e0e0c720266d220e06b71da27584b5498a7f81a78f1a719c59e9dce39b1c4d1cN.exe
-
Size
120KB
-
MD5
8ace0d77c251b39a68cc37401b68f090
-
SHA1
fe9d047029f151d623fdd429f5061f609289bcc6
-
SHA256
e0e0c720266d220e06b71da27584b5498a7f81a78f1a719c59e9dce39b1c4d1c
-
SHA512
bfd3e9536523f7fa2d39360ae90d02c3342742475eabafc5f4b4d0aba6de88e966051ad26ac09e97b729760aaf5dac206ed6da4661a14c04096dbf11aec3becc
-
SSDEEP
1536:o7Z4VI2TAz8aRRGoVrI2x1q6sYBngcYCkPecOI/vFsKKHIOBxUaM3HJ5FEiSYkJV:oi8BcoVrNbqkpgP5KHD1eHJrEwkDL
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5