General
-
Target
5e518d9ab0004f4d49e8d86cdd6735688d0909b9b14311ed1cab4cfd55194d68.exe
-
Size
120KB
-
Sample
241217-msrnhaykaj
-
MD5
fb029fc6f54fe8d9c84537dc571d61d0
-
SHA1
d5f8a1f410f95552c2a02e186e8f42814f03773d
-
SHA256
5e518d9ab0004f4d49e8d86cdd6735688d0909b9b14311ed1cab4cfd55194d68
-
SHA512
fc14f86e434e00de379d6d7429baff611bf05cb04d57a7afbbd6caaa0be16ee9cd9ae91840fb0c21b09ae2ee3437307b6b55a192e114aff4df87a933affc6241
-
SSDEEP
3072:soBFxb8t20SSVt0y5EkMuKYKz0xDjWpeG:NFxbM15X7KYKzaDjWpeG
Static task
static1
Behavioral task
behavioral1
Sample
5e518d9ab0004f4d49e8d86cdd6735688d0909b9b14311ed1cab4cfd55194d68.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5e518d9ab0004f4d49e8d86cdd6735688d0909b9b14311ed1cab4cfd55194d68.exe
-
Size
120KB
-
MD5
fb029fc6f54fe8d9c84537dc571d61d0
-
SHA1
d5f8a1f410f95552c2a02e186e8f42814f03773d
-
SHA256
5e518d9ab0004f4d49e8d86cdd6735688d0909b9b14311ed1cab4cfd55194d68
-
SHA512
fc14f86e434e00de379d6d7429baff611bf05cb04d57a7afbbd6caaa0be16ee9cd9ae91840fb0c21b09ae2ee3437307b6b55a192e114aff4df87a933affc6241
-
SSDEEP
3072:soBFxb8t20SSVt0y5EkMuKYKz0xDjWpeG:NFxbM15X7KYKzaDjWpeG
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5