General
-
Target
9d49da7a7793b7f15a72c7d024e510dd1ea8d5ffdee485c4541ba7af0b857774.exe
-
Size
120KB
-
Sample
241217-hqlbgstlbt
-
MD5
27951d04f381c0a585358f9942469cf9
-
SHA1
2b81d2be2d6e27fa9d26feae8785c4d5dd8d6d1a
-
SHA256
9d49da7a7793b7f15a72c7d024e510dd1ea8d5ffdee485c4541ba7af0b857774
-
SHA512
263260e343e8cc76564559eb7c0db613b82ef3bff00497dce9bdeb948f33bbcf91a895a1b97d70bbc86d44105014554f2e009aaee57459bc879239e1dcad52d1
-
SSDEEP
3072:wBVr2IaPf1TP+2nKk3Kkwkum+pTl8/pjUdpchpksSlJ:QV+f1j+2nFKk+p4UL9dlJ
Static task
static1
Behavioral task
behavioral1
Sample
9d49da7a7793b7f15a72c7d024e510dd1ea8d5ffdee485c4541ba7af0b857774.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9d49da7a7793b7f15a72c7d024e510dd1ea8d5ffdee485c4541ba7af0b857774.exe
-
Size
120KB
-
MD5
27951d04f381c0a585358f9942469cf9
-
SHA1
2b81d2be2d6e27fa9d26feae8785c4d5dd8d6d1a
-
SHA256
9d49da7a7793b7f15a72c7d024e510dd1ea8d5ffdee485c4541ba7af0b857774
-
SHA512
263260e343e8cc76564559eb7c0db613b82ef3bff00497dce9bdeb948f33bbcf91a895a1b97d70bbc86d44105014554f2e009aaee57459bc879239e1dcad52d1
-
SSDEEP
3072:wBVr2IaPf1TP+2nKk3Kkwkum+pTl8/pjUdpchpksSlJ:QV+f1j+2nFKk+p4UL9dlJ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5