General
-
Target
2ef7adffb8d15073fd40e33b85ac3cd63ab2ece652a20dfca859ba943c56b62cN.exe
-
Size
1.8MB
-
Sample
241217-k1jazswjgy
-
MD5
85ea53c8cd15a82873ff4a7d6c8a0700
-
SHA1
a8b61902f8ddcbf543a72a9945b3e56db988c164
-
SHA256
2ef7adffb8d15073fd40e33b85ac3cd63ab2ece652a20dfca859ba943c56b62c
-
SHA512
b2789a16b69435793e42222ef6e21dc767045d2652c6633f4d8395a6f1a151a62c47cef9edf98fe628f3e57524e14be2a75ccc043069a19533e457a5fbaadb49
-
SSDEEP
49152:sffZMOlq1y3vPhIkNqNoNI/y21vtJndjh7CdxE2:IZTwxd/FtJdjh7Az
Static task
static1
Behavioral task
behavioral1
Sample
2ef7adffb8d15073fd40e33b85ac3cd63ab2ece652a20dfca859ba943c56b62cN.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2ef7adffb8d15073fd40e33b85ac3cd63ab2ece652a20dfca859ba943c56b62cN.exe
-
Size
1.8MB
-
MD5
85ea53c8cd15a82873ff4a7d6c8a0700
-
SHA1
a8b61902f8ddcbf543a72a9945b3e56db988c164
-
SHA256
2ef7adffb8d15073fd40e33b85ac3cd63ab2ece652a20dfca859ba943c56b62c
-
SHA512
b2789a16b69435793e42222ef6e21dc767045d2652c6633f4d8395a6f1a151a62c47cef9edf98fe628f3e57524e14be2a75ccc043069a19533e457a5fbaadb49
-
SSDEEP
49152:sffZMOlq1y3vPhIkNqNoNI/y21vtJndjh7CdxE2:IZTwxd/FtJdjh7Az
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5