General
-
Target
e2bdb19a27be98f626353e9618ed26bae2c805d4c335ead300abd96c8a5d3a9dN.exe
-
Size
120KB
-
Sample
241217-m779ssxpfx
-
MD5
4907deebb668f07377538dccb2960540
-
SHA1
ac527d0b305760e524173507f0b682ed7b9f4c0e
-
SHA256
e2bdb19a27be98f626353e9618ed26bae2c805d4c335ead300abd96c8a5d3a9d
-
SHA512
e83e0bae384b275aa065b448b58eefada55b9a3d64e0a0741bcf924badbc840e34fc82055a5964dcc641f05d660bdaa046a757f372d7e028b014af572fd6e449
-
SSDEEP
1536:sq5Y5rq7VIbeGld1MAIio0dZuAvBEp6AGCPCi00advCaYnwKvdxscqcmV9mX78:sq5YtyVPUIQBUGliiYw0DmA
Static task
static1
Behavioral task
behavioral1
Sample
e2bdb19a27be98f626353e9618ed26bae2c805d4c335ead300abd96c8a5d3a9dN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e2bdb19a27be98f626353e9618ed26bae2c805d4c335ead300abd96c8a5d3a9dN.exe
-
Size
120KB
-
MD5
4907deebb668f07377538dccb2960540
-
SHA1
ac527d0b305760e524173507f0b682ed7b9f4c0e
-
SHA256
e2bdb19a27be98f626353e9618ed26bae2c805d4c335ead300abd96c8a5d3a9d
-
SHA512
e83e0bae384b275aa065b448b58eefada55b9a3d64e0a0741bcf924badbc840e34fc82055a5964dcc641f05d660bdaa046a757f372d7e028b014af572fd6e449
-
SSDEEP
1536:sq5Y5rq7VIbeGld1MAIio0dZuAvBEp6AGCPCi00advCaYnwKvdxscqcmV9mX78:sq5YtyVPUIQBUGliiYw0DmA
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5