General
-
Target
633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243.exe
-
Size
120KB
-
Sample
241217-g9j24atpel
-
MD5
9f42f9b80d5b45a755c4afceecad2d7b
-
SHA1
10bc3bb7e44f0353f6da5c5e82e463d305ef8c64
-
SHA256
633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243
-
SHA512
921508e0a31d8f79701795e54992286100dbbff6f67e5f9e6cb8b4f1209ca9795ced437f51c6987920e882c256996088cc32814545a1a7f23ddc505ce36d63d0
-
SSDEEP
1536:uwx9OwQmXUI7vsLOrJlCmnyQ15HKKBC+n2JDjF+w4zY9fmvkpYqARKQxvWLaYcZ4:xmWXUS19VKxJZ+w4zYwvkf6xxvTYO93e
Static task
static1
Behavioral task
behavioral1
Sample
633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243.exe
-
Size
120KB
-
MD5
9f42f9b80d5b45a755c4afceecad2d7b
-
SHA1
10bc3bb7e44f0353f6da5c5e82e463d305ef8c64
-
SHA256
633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243
-
SHA512
921508e0a31d8f79701795e54992286100dbbff6f67e5f9e6cb8b4f1209ca9795ced437f51c6987920e882c256996088cc32814545a1a7f23ddc505ce36d63d0
-
SSDEEP
1536:uwx9OwQmXUI7vsLOrJlCmnyQ15HKKBC+n2JDjF+w4zY9fmvkpYqARKQxvWLaYcZ4:xmWXUS19VKxJZ+w4zYwvkf6xxvTYO93e
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5