General
-
Target
e4fc6e338960d1237d9be5a4c42addd117a946f6ed639ae3e44a15b535a5088aN.exe
-
Size
120KB
-
Sample
241217-lffvsswlhz
-
MD5
81c1572364505ebba96dbbbf77a1a840
-
SHA1
9241f5d085ae2a4a0d011a652f47bf7c78337710
-
SHA256
e4fc6e338960d1237d9be5a4c42addd117a946f6ed639ae3e44a15b535a5088a
-
SHA512
4c9c6881405f393951a7d88dc84272a9a0afc0edc1286633e14c834989ba4e45af59581a05ea923b584409e68187394769995c58099aaf60fd6b7fa0f1acf8f9
-
SSDEEP
3072:e2wAnaOrQR7SBj6HtmOJxJjEnYrFPVlrTl2/:LwA9rrwNBJjm6Fdlnl+
Static task
static1
Behavioral task
behavioral1
Sample
e4fc6e338960d1237d9be5a4c42addd117a946f6ed639ae3e44a15b535a5088aN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e4fc6e338960d1237d9be5a4c42addd117a946f6ed639ae3e44a15b535a5088aN.exe
-
Size
120KB
-
MD5
81c1572364505ebba96dbbbf77a1a840
-
SHA1
9241f5d085ae2a4a0d011a652f47bf7c78337710
-
SHA256
e4fc6e338960d1237d9be5a4c42addd117a946f6ed639ae3e44a15b535a5088a
-
SHA512
4c9c6881405f393951a7d88dc84272a9a0afc0edc1286633e14c834989ba4e45af59581a05ea923b584409e68187394769995c58099aaf60fd6b7fa0f1acf8f9
-
SSDEEP
3072:e2wAnaOrQR7SBj6HtmOJxJjEnYrFPVlrTl2/:LwA9rrwNBJjm6Fdlnl+
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5