General
-
Target
9529b02cb9adeff217c9a57cfe867b73056ade0efa54ead5bcca6294f118a9b5N.exe
-
Size
120KB
-
Sample
241217-kqk2tsvraz
-
MD5
71978d951d9071e88cdc891fdb3ae0c0
-
SHA1
7e1d89b724cd01c4a1b3f5a0783d435e8f63ccdf
-
SHA256
9529b02cb9adeff217c9a57cfe867b73056ade0efa54ead5bcca6294f118a9b5
-
SHA512
39aef2b5febd84c4f6c59454eaf119ef8c1789e4849d927a1f5f0913897d0f1a5ee714ec9b8e1c5c253904692224ae030036a531641a1aed8fb474df5aa28c07
-
SSDEEP
3072:eewJuzPRfTMRMncuSjhsA0DkeD2XdL1P6J64:e1JujBIRMnJmOKe+VQ
Static task
static1
Behavioral task
behavioral1
Sample
9529b02cb9adeff217c9a57cfe867b73056ade0efa54ead5bcca6294f118a9b5N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9529b02cb9adeff217c9a57cfe867b73056ade0efa54ead5bcca6294f118a9b5N.exe
-
Size
120KB
-
MD5
71978d951d9071e88cdc891fdb3ae0c0
-
SHA1
7e1d89b724cd01c4a1b3f5a0783d435e8f63ccdf
-
SHA256
9529b02cb9adeff217c9a57cfe867b73056ade0efa54ead5bcca6294f118a9b5
-
SHA512
39aef2b5febd84c4f6c59454eaf119ef8c1789e4849d927a1f5f0913897d0f1a5ee714ec9b8e1c5c253904692224ae030036a531641a1aed8fb474df5aa28c07
-
SSDEEP
3072:eewJuzPRfTMRMncuSjhsA0DkeD2XdL1P6J64:e1JujBIRMnJmOKe+VQ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5