General
-
Target
99ff1173f02e86d198d7b229e532b3bed2e4d8de4be20f96324d454102339f7eN.exe
-
Size
120KB
-
Sample
241217-eyft7azqcw
-
MD5
19ea00d60cb72f4bd6d63dfa339c4250
-
SHA1
f9c426999eff5d226aa77d4f127066a28d872714
-
SHA256
99ff1173f02e86d198d7b229e532b3bed2e4d8de4be20f96324d454102339f7e
-
SHA512
0ca8f1517213d92ca4c5aae86792208ac3efda13dec82b53b058c13ad26d97466432ad878748b115eb1ae0679073dcc29f2e78ecf6ec78a79ad86f8b1ffe9223
-
SSDEEP
3072:t6RdsJRnvxBVOGb9gHRdR49BxG9siWjaDnq:kRd6nv7EGb2RSMNOq
Static task
static1
Behavioral task
behavioral1
Sample
99ff1173f02e86d198d7b229e532b3bed2e4d8de4be20f96324d454102339f7eN.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
99ff1173f02e86d198d7b229e532b3bed2e4d8de4be20f96324d454102339f7eN.exe
-
Size
120KB
-
MD5
19ea00d60cb72f4bd6d63dfa339c4250
-
SHA1
f9c426999eff5d226aa77d4f127066a28d872714
-
SHA256
99ff1173f02e86d198d7b229e532b3bed2e4d8de4be20f96324d454102339f7e
-
SHA512
0ca8f1517213d92ca4c5aae86792208ac3efda13dec82b53b058c13ad26d97466432ad878748b115eb1ae0679073dcc29f2e78ecf6ec78a79ad86f8b1ffe9223
-
SSDEEP
3072:t6RdsJRnvxBVOGb9gHRdR49BxG9siWjaDnq:kRd6nv7EGb2RSMNOq
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5