General
-
Target
2fe66095b64d12cb593f9d333f4a080cb29670def06d2276f40adf54c8802263.exe
-
Size
120KB
-
Sample
241217-k684lawrfj
-
MD5
09f5abc0f11f4ca57b2aeaa2c38f1d60
-
SHA1
a5d8c948a10c72a37ff2ef9743beab1a009b6010
-
SHA256
2fe66095b64d12cb593f9d333f4a080cb29670def06d2276f40adf54c8802263
-
SHA512
6423bf35e3f28c3684c73c7da8380f284decc68c29e4551aa4bee80fd980fb9492792beb62766b45fb1cc36e9dc83aec3f8b979bce8af619020e00339f6d6776
-
SSDEEP
3072:pGNRBY4fRCrIXNeImmWxRgf+ebME8S8rBZqaSN:IXa45wE+HE8S8rBZfi
Static task
static1
Behavioral task
behavioral1
Sample
2fe66095b64d12cb593f9d333f4a080cb29670def06d2276f40adf54c8802263.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2fe66095b64d12cb593f9d333f4a080cb29670def06d2276f40adf54c8802263.exe
-
Size
120KB
-
MD5
09f5abc0f11f4ca57b2aeaa2c38f1d60
-
SHA1
a5d8c948a10c72a37ff2ef9743beab1a009b6010
-
SHA256
2fe66095b64d12cb593f9d333f4a080cb29670def06d2276f40adf54c8802263
-
SHA512
6423bf35e3f28c3684c73c7da8380f284decc68c29e4551aa4bee80fd980fb9492792beb62766b45fb1cc36e9dc83aec3f8b979bce8af619020e00339f6d6776
-
SSDEEP
3072:pGNRBY4fRCrIXNeImmWxRgf+ebME8S8rBZqaSN:IXa45wE+HE8S8rBZfi
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5