General
-
Target
744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8N.exe
-
Size
120KB
-
Sample
241217-fpscas1pc1
-
MD5
923c1e6fb058383219782f0a4f8b7c40
-
SHA1
607afcf38fa4ce6da288ff6cd0a2ce45b961ca0f
-
SHA256
744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8
-
SHA512
8225453996f47d1ed696a384a373eae9de1c8bc66c076a612c15d23316e76665a1419658625d9345c2109ace76ba5600c33dc4be0ae45e44e7ee267accfc9ea7
-
SSDEEP
3072:WEG2BEWmETe8A76x77y7K89JFYQ26+tAcGn:WEnEWmE68pXyW4JFC6+bGn
Static task
static1
Behavioral task
behavioral1
Sample
744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8N.exe
-
Size
120KB
-
MD5
923c1e6fb058383219782f0a4f8b7c40
-
SHA1
607afcf38fa4ce6da288ff6cd0a2ce45b961ca0f
-
SHA256
744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8
-
SHA512
8225453996f47d1ed696a384a373eae9de1c8bc66c076a612c15d23316e76665a1419658625d9345c2109ace76ba5600c33dc4be0ae45e44e7ee267accfc9ea7
-
SSDEEP
3072:WEG2BEWmETe8A76x77y7K89JFYQ26+tAcGn:WEnEWmE68pXyW4JFC6+bGn
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5