General
-
Target
841bccfeb5c34820201b44adbdf397f8c8909ec3d214a1715e670609f7f7bdeaN.exe
-
Size
120KB
-
Sample
241217-bdxqeswngq
-
MD5
581f6960d1a4f406d8dd242deb9d4990
-
SHA1
896d8500383f96bdbb0bae0a018db56c2908b1fe
-
SHA256
841bccfeb5c34820201b44adbdf397f8c8909ec3d214a1715e670609f7f7bdea
-
SHA512
1d213f27d133d153ebd9642a8165912648a2c1ca25c3f2924e804908c0d6892cca86173986defb7e50e5a7b48f6d713b93fe50408162165c729a1240d9d78b78
-
SSDEEP
1536:2HNmz46IQB9nPQA6qCvFXVTLh+acQNyZYBS00hFpl5EsnSRItDioQ0jYSbRACp:Q04JQBq1VnhIQBB0d59SRaioDjYSbqC
Static task
static1
Behavioral task
behavioral1
Sample
841bccfeb5c34820201b44adbdf397f8c8909ec3d214a1715e670609f7f7bdeaN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
841bccfeb5c34820201b44adbdf397f8c8909ec3d214a1715e670609f7f7bdeaN.exe
-
Size
120KB
-
MD5
581f6960d1a4f406d8dd242deb9d4990
-
SHA1
896d8500383f96bdbb0bae0a018db56c2908b1fe
-
SHA256
841bccfeb5c34820201b44adbdf397f8c8909ec3d214a1715e670609f7f7bdea
-
SHA512
1d213f27d133d153ebd9642a8165912648a2c1ca25c3f2924e804908c0d6892cca86173986defb7e50e5a7b48f6d713b93fe50408162165c729a1240d9d78b78
-
SSDEEP
1536:2HNmz46IQB9nPQA6qCvFXVTLh+acQNyZYBS00hFpl5EsnSRItDioQ0jYSbRACp:Q04JQBq1VnhIQBB0d59SRaioDjYSbqC
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5