General
-
Target
117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5fN.exe
-
Size
120KB
-
Sample
241217-ephbnazncz
-
MD5
660f3e49c015736f102180a76d7910c0
-
SHA1
ddc8767303674dc89f20601389d7ef5aa1a8c403
-
SHA256
117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5f
-
SHA512
6e21faa57cb7123537273c41f651763d4fedd7c1fa2ce646b0c2ef8aa76d1a3a7b686924cafc5caa1f415764c0818d15d8ad7d78574f29d8660ab047d2a1b702
-
SSDEEP
3072:4rYftpkFXOh0jCJ+CioOANL96TCpjeN2O9:4r1hO0jCJbidAnIoW2
Static task
static1
Behavioral task
behavioral1
Sample
117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5fN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5fN.exe
-
Size
120KB
-
MD5
660f3e49c015736f102180a76d7910c0
-
SHA1
ddc8767303674dc89f20601389d7ef5aa1a8c403
-
SHA256
117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5f
-
SHA512
6e21faa57cb7123537273c41f651763d4fedd7c1fa2ce646b0c2ef8aa76d1a3a7b686924cafc5caa1f415764c0818d15d8ad7d78574f29d8660ab047d2a1b702
-
SSDEEP
3072:4rYftpkFXOh0jCJ+CioOANL96TCpjeN2O9:4r1hO0jCJbidAnIoW2
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5