General
-
Target
701e3194584d15675642dcac81bdb22c82c4d57d97534b1df24842f270cd3e0eN.exe
-
Size
120KB
-
Sample
241217-elfnnazmcz
-
MD5
dd37af411eb28cbab24f761e75299df0
-
SHA1
92c9eca0f19a9f383e91418d8ab659fe759def9f
-
SHA256
701e3194584d15675642dcac81bdb22c82c4d57d97534b1df24842f270cd3e0e
-
SHA512
410f5afe7bb1207095d69d53255696c3c61aa59427cdaca716de99842f3d551aec1de121290a8febe2d755972911b64763c760c574ea11a880e21b3d64f3e8fe
-
SSDEEP
1536:uwx9OwQmXUI7vsLOrJlCmnyQ15HKKBC+n2JDjF+w4zY9fmvkpYqARKQxvWLaYcZZ:xmWXUS19VKxJZ+w4zYwvkf6xxvTYO93
Static task
static1
Behavioral task
behavioral1
Sample
701e3194584d15675642dcac81bdb22c82c4d57d97534b1df24842f270cd3e0eN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
701e3194584d15675642dcac81bdb22c82c4d57d97534b1df24842f270cd3e0eN.exe
-
Size
120KB
-
MD5
dd37af411eb28cbab24f761e75299df0
-
SHA1
92c9eca0f19a9f383e91418d8ab659fe759def9f
-
SHA256
701e3194584d15675642dcac81bdb22c82c4d57d97534b1df24842f270cd3e0e
-
SHA512
410f5afe7bb1207095d69d53255696c3c61aa59427cdaca716de99842f3d551aec1de121290a8febe2d755972911b64763c760c574ea11a880e21b3d64f3e8fe
-
SSDEEP
1536:uwx9OwQmXUI7vsLOrJlCmnyQ15HKKBC+n2JDjF+w4zY9fmvkpYqARKQxvWLaYcZZ:xmWXUS19VKxJZ+w4zYwvkf6xxvTYO93
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5