General
-
Target
510500eb1a69670ba9c559034a9571d6d9c907514b846baff52d64873ddacbba.exe
-
Size
120KB
-
Sample
241217-jp6rgavqek
-
MD5
cb62c5c9747c4eaf9bab2a56b72f0e26
-
SHA1
50da85d216295635f70e56d6024ad826747811ad
-
SHA256
510500eb1a69670ba9c559034a9571d6d9c907514b846baff52d64873ddacbba
-
SHA512
3708afd13c83528c07e4eb6fdc2ef3ef6f2725c419c4c9e314baa8db38878bda944a075f700d85ed35474d1785f4dc477f07ff4387bc99ab3ba1c8ec25f940ac
-
SSDEEP
1536:jNbQoxG1yQAVrvenhJ+VJL/nL+hyzL8Nw1cT4DePwmSLGneQqfOs:jNcEG1Mrv4hJStL+hyX8i8PwmSL8qGs
Static task
static1
Behavioral task
behavioral1
Sample
510500eb1a69670ba9c559034a9571d6d9c907514b846baff52d64873ddacbba.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
510500eb1a69670ba9c559034a9571d6d9c907514b846baff52d64873ddacbba.exe
-
Size
120KB
-
MD5
cb62c5c9747c4eaf9bab2a56b72f0e26
-
SHA1
50da85d216295635f70e56d6024ad826747811ad
-
SHA256
510500eb1a69670ba9c559034a9571d6d9c907514b846baff52d64873ddacbba
-
SHA512
3708afd13c83528c07e4eb6fdc2ef3ef6f2725c419c4c9e314baa8db38878bda944a075f700d85ed35474d1785f4dc477f07ff4387bc99ab3ba1c8ec25f940ac
-
SSDEEP
1536:jNbQoxG1yQAVrvenhJ+VJL/nL+hyzL8Nw1cT4DePwmSLGneQqfOs:jNcEG1Mrv4hJStL+hyX8i8PwmSL8qGs
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5