General
-
Target
d4ce4dd5f02dabafe3d2c398826eac2998a4c178c6a12f9d1174e9a69873406e.exe
-
Size
120KB
-
Sample
241217-fwgt5sspcn
-
MD5
702651c2eb93d320cf68b3624a593fb6
-
SHA1
dfb298da67041eaaf604550156820b17f196c132
-
SHA256
d4ce4dd5f02dabafe3d2c398826eac2998a4c178c6a12f9d1174e9a69873406e
-
SHA512
656397964cdfece078125fdb4d6e0e15b038b3e3dfd79d7ea46c9c9615704bba8e65aab4a0048ff25471cfdf869641e71934f45c1f9a7b6bf21b0c70cd26e4bd
-
SSDEEP
1536:P7cgpmQC8GP1gRG924QYSPzMBLxdLgekKUB/AXSl+p2qKAtHp8iFy+eMCJBhX:Jz1GGRwQYSoxdgekHKil42VANp1F0h9
Static task
static1
Behavioral task
behavioral1
Sample
d4ce4dd5f02dabafe3d2c398826eac2998a4c178c6a12f9d1174e9a69873406e.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d4ce4dd5f02dabafe3d2c398826eac2998a4c178c6a12f9d1174e9a69873406e.exe
-
Size
120KB
-
MD5
702651c2eb93d320cf68b3624a593fb6
-
SHA1
dfb298da67041eaaf604550156820b17f196c132
-
SHA256
d4ce4dd5f02dabafe3d2c398826eac2998a4c178c6a12f9d1174e9a69873406e
-
SHA512
656397964cdfece078125fdb4d6e0e15b038b3e3dfd79d7ea46c9c9615704bba8e65aab4a0048ff25471cfdf869641e71934f45c1f9a7b6bf21b0c70cd26e4bd
-
SSDEEP
1536:P7cgpmQC8GP1gRG924QYSPzMBLxdLgekKUB/AXSl+p2qKAtHp8iFy+eMCJBhX:Jz1GGRwQYSoxdgekHKil42VANp1F0h9
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5