General
-
Target
b54df043db12c340639ed6b51537bc57f2e7dd9ee9f48322cd228351063bdf71.exe
-
Size
120KB
-
Sample
241217-hrqycstlcz
-
MD5
f26bb03801443d31d60689ef0deab95d
-
SHA1
45a619b307e356cfeee1fedd63ad1ecab79b8dec
-
SHA256
b54df043db12c340639ed6b51537bc57f2e7dd9ee9f48322cd228351063bdf71
-
SHA512
51cf2d6692f207152ec1fdd055493f04ada8e130a68eedb9bc078997728c4a8f8bc381797ee21b06a56c7c87a05e6fd4b78ab7d4c05dcc1e697d4f7ed8861b77
-
SSDEEP
3072:bxrqZzLskmmOzCf1Pnn4khqb7yih1AHhjJGDxJ:bxrq316nxADG3
Static task
static1
Behavioral task
behavioral1
Sample
b54df043db12c340639ed6b51537bc57f2e7dd9ee9f48322cd228351063bdf71.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b54df043db12c340639ed6b51537bc57f2e7dd9ee9f48322cd228351063bdf71.exe
-
Size
120KB
-
MD5
f26bb03801443d31d60689ef0deab95d
-
SHA1
45a619b307e356cfeee1fedd63ad1ecab79b8dec
-
SHA256
b54df043db12c340639ed6b51537bc57f2e7dd9ee9f48322cd228351063bdf71
-
SHA512
51cf2d6692f207152ec1fdd055493f04ada8e130a68eedb9bc078997728c4a8f8bc381797ee21b06a56c7c87a05e6fd4b78ab7d4c05dcc1e697d4f7ed8861b77
-
SSDEEP
3072:bxrqZzLskmmOzCf1Pnn4khqb7yih1AHhjJGDxJ:bxrq316nxADG3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5