General
-
Target
99a5b0aa4deeab60c85c0e6111587775aa30fa0edbd450b85b9fafdf8106b6f2.exe
-
Size
120KB
-
Sample
241217-cwpyzaylhj
-
MD5
13de8f47eb89275c68ab19f6c5e8ae7a
-
SHA1
e7b2aa74594576cc600a28c2ace6a8ffb3b80c99
-
SHA256
99a5b0aa4deeab60c85c0e6111587775aa30fa0edbd450b85b9fafdf8106b6f2
-
SHA512
38d3a047cc0fec77de09526b6ab37a011b7a7206f580d5a708c0c6674a60275aab6c123ee648ea60dff0cd9a5aa87d1c46d66c890541820663f8acbce772a051
-
SSDEEP
3072:0FdEFtFFGK/HF4Oy61XnwiULESgVJCJwfASa0:0FCFGK/by6pwPLEvVUwFa0
Static task
static1
Behavioral task
behavioral1
Sample
99a5b0aa4deeab60c85c0e6111587775aa30fa0edbd450b85b9fafdf8106b6f2.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
99a5b0aa4deeab60c85c0e6111587775aa30fa0edbd450b85b9fafdf8106b6f2.exe
-
Size
120KB
-
MD5
13de8f47eb89275c68ab19f6c5e8ae7a
-
SHA1
e7b2aa74594576cc600a28c2ace6a8ffb3b80c99
-
SHA256
99a5b0aa4deeab60c85c0e6111587775aa30fa0edbd450b85b9fafdf8106b6f2
-
SHA512
38d3a047cc0fec77de09526b6ab37a011b7a7206f580d5a708c0c6674a60275aab6c123ee648ea60dff0cd9a5aa87d1c46d66c890541820663f8acbce772a051
-
SSDEEP
3072:0FdEFtFFGK/HF4Oy61XnwiULESgVJCJwfASa0:0FCFGK/by6pwPLEvVUwFa0
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5