General
-
Target
9a0f9300fa02939d62015513987fe2654dd459fecbd6f415cc2e560062e29ba0N.exe
-
Size
120KB
-
Sample
241217-fdz8rs1lhw
-
MD5
b92732863e9cacc0a465465c96aab3e0
-
SHA1
fd52f1146f8caadfe969b5dffdefeaf5d879a9bd
-
SHA256
9a0f9300fa02939d62015513987fe2654dd459fecbd6f415cc2e560062e29ba0
-
SHA512
3c017e70018d8402f8253dc9ad31a59157c932b336db18e227b49ef51321b20ba35cc731534cee8af119d1c66bfe017ed92aeae19ab82452c90c5bd2dd9ec150
-
SSDEEP
3072:SRNVJyy4a0n05O8O0k8zvyEOzRJBgfjDI9k+:SRfJx5nBk84gb
Static task
static1
Behavioral task
behavioral1
Sample
9a0f9300fa02939d62015513987fe2654dd459fecbd6f415cc2e560062e29ba0N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9a0f9300fa02939d62015513987fe2654dd459fecbd6f415cc2e560062e29ba0N.exe
-
Size
120KB
-
MD5
b92732863e9cacc0a465465c96aab3e0
-
SHA1
fd52f1146f8caadfe969b5dffdefeaf5d879a9bd
-
SHA256
9a0f9300fa02939d62015513987fe2654dd459fecbd6f415cc2e560062e29ba0
-
SHA512
3c017e70018d8402f8253dc9ad31a59157c932b336db18e227b49ef51321b20ba35cc731534cee8af119d1c66bfe017ed92aeae19ab82452c90c5bd2dd9ec150
-
SSDEEP
3072:SRNVJyy4a0n05O8O0k8zvyEOzRJBgfjDI9k+:SRfJx5nBk84gb
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5