General
-
Target
29de71ad43e3beada0ac0a6740c832600d2d265a5863386dbbf08d013c13d63a.exe
-
Size
120KB
-
Sample
241217-hcrw4ssrgw
-
MD5
2b567a7bae65f1e7dd49aa39a4acbde7
-
SHA1
bfa9b1abca6bd718d04266344aaacaf6b7e22497
-
SHA256
29de71ad43e3beada0ac0a6740c832600d2d265a5863386dbbf08d013c13d63a
-
SHA512
3436805e04a3e2b973864091d2843e64b64bdde60b2ff364909f980d05f183e53c15089b139105c80f30e6caae295d715441eeffe805747c5ddf720c4424f908
-
SSDEEP
3072:5HvA1XuW8EbPFm1U4CBPyj9h7vB18Bjus7Zzo:Wd/8OPQ19h75qBjn7ZM
Static task
static1
Behavioral task
behavioral1
Sample
29de71ad43e3beada0ac0a6740c832600d2d265a5863386dbbf08d013c13d63a.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
29de71ad43e3beada0ac0a6740c832600d2d265a5863386dbbf08d013c13d63a.exe
-
Size
120KB
-
MD5
2b567a7bae65f1e7dd49aa39a4acbde7
-
SHA1
bfa9b1abca6bd718d04266344aaacaf6b7e22497
-
SHA256
29de71ad43e3beada0ac0a6740c832600d2d265a5863386dbbf08d013c13d63a
-
SHA512
3436805e04a3e2b973864091d2843e64b64bdde60b2ff364909f980d05f183e53c15089b139105c80f30e6caae295d715441eeffe805747c5ddf720c4424f908
-
SSDEEP
3072:5HvA1XuW8EbPFm1U4CBPyj9h7vB18Bjus7Zzo:Wd/8OPQ19h75qBjn7ZM
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5