General
-
Target
e4732d5bbde347680770d26049295ad7ac58b6c92cb481112262ff9fe296cb5f.exe
-
Size
120KB
-
Sample
241217-dpwnlszlbn
-
MD5
4c80fc7a52d0c19ad035e07ea1f742bf
-
SHA1
5ecebdd9344d52dab544d67e514a05b03a5f0e1d
-
SHA256
e4732d5bbde347680770d26049295ad7ac58b6c92cb481112262ff9fe296cb5f
-
SHA512
ddb461df6a52642841adf30c5c25cf40e1260713f7819ac587e2566c2850ca6d78b2bfdf305a2ce1ce8544937be67a95153b0bf99006a3c5b8ba306a879f959d
-
SSDEEP
1536:QrQJm49UoWHAKZw73UTIMA1OyJGuXjj5Nv5kaw4/KtY2ldPBZx/K5V+MRUYr25P/:Q5QUo6A3tJGuXjlTl/Kt9HZZBK2r
Static task
static1
Behavioral task
behavioral1
Sample
e4732d5bbde347680770d26049295ad7ac58b6c92cb481112262ff9fe296cb5f.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e4732d5bbde347680770d26049295ad7ac58b6c92cb481112262ff9fe296cb5f.exe
-
Size
120KB
-
MD5
4c80fc7a52d0c19ad035e07ea1f742bf
-
SHA1
5ecebdd9344d52dab544d67e514a05b03a5f0e1d
-
SHA256
e4732d5bbde347680770d26049295ad7ac58b6c92cb481112262ff9fe296cb5f
-
SHA512
ddb461df6a52642841adf30c5c25cf40e1260713f7819ac587e2566c2850ca6d78b2bfdf305a2ce1ce8544937be67a95153b0bf99006a3c5b8ba306a879f959d
-
SSDEEP
1536:QrQJm49UoWHAKZw73UTIMA1OyJGuXjj5Nv5kaw4/KtY2ldPBZx/K5V+MRUYr25P/:Q5QUo6A3tJGuXjlTl/Kt9HZZBK2r
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5