General
-
Target
96b1907f73ff20907d5e148d32952041aad3373900b2a58bb76a8bc5f880d3e3N.exe
-
Size
120KB
-
Sample
241217-glnqdatkfk
-
MD5
58d4243841f7cf87a4ef6f452913d800
-
SHA1
c69319b1d3258415fa952d02c0bb51c4ff39639b
-
SHA256
96b1907f73ff20907d5e148d32952041aad3373900b2a58bb76a8bc5f880d3e3
-
SHA512
1fbaf3e93d7c9f47e1b35d6d0773ac2e3fc43c6dc81dff54a723b5801b768838b519707bae37c72389b595f8c5bc080f695efa8821b3880a5d21d9e127bb58c0
-
SSDEEP
1536:YYz1+2mbOUZcziLHQyEukz38qKFvG+ROj42LuHGVjOOjTHIB5Zu:tRs6uLHEukWvGjuwOOjUBi
Static task
static1
Behavioral task
behavioral1
Sample
96b1907f73ff20907d5e148d32952041aad3373900b2a58bb76a8bc5f880d3e3N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
96b1907f73ff20907d5e148d32952041aad3373900b2a58bb76a8bc5f880d3e3N.exe
-
Size
120KB
-
MD5
58d4243841f7cf87a4ef6f452913d800
-
SHA1
c69319b1d3258415fa952d02c0bb51c4ff39639b
-
SHA256
96b1907f73ff20907d5e148d32952041aad3373900b2a58bb76a8bc5f880d3e3
-
SHA512
1fbaf3e93d7c9f47e1b35d6d0773ac2e3fc43c6dc81dff54a723b5801b768838b519707bae37c72389b595f8c5bc080f695efa8821b3880a5d21d9e127bb58c0
-
SSDEEP
1536:YYz1+2mbOUZcziLHQyEukz38qKFvG+ROj42LuHGVjOOjTHIB5Zu:tRs6uLHEukWvGjuwOOjUBi
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5