General
-
Target
50aa201729e7959d32663887003c23ed48ad087f5295009d68662566c1b22dccN.exe
-
Size
120KB
-
Sample
241217-nrcnmayjds
-
MD5
28d26fa98facc66f75c15c6f707c8690
-
SHA1
8f9605a8c95f50593e72d1847e51076ebc76040b
-
SHA256
50aa201729e7959d32663887003c23ed48ad087f5295009d68662566c1b22dcc
-
SHA512
118ac81ed568ed9fc1bfea2021046969ba3f9b8b96adb5e1d715e7186d2e2badb452c2c8819c76082757b43caccbab2a13d9b187e200d67dc5302c7ccc385502
-
SSDEEP
1536:MP1yCugTdpTc5XnzNEQyesvPX2o2pYv8HOo0l9wXRghTNNkTnIQgCMLJpKj3:MP0gdVGBEQyBPv2pYTok98IqvMLv
Static task
static1
Behavioral task
behavioral1
Sample
50aa201729e7959d32663887003c23ed48ad087f5295009d68662566c1b22dccN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
50aa201729e7959d32663887003c23ed48ad087f5295009d68662566c1b22dccN.exe
-
Size
120KB
-
MD5
28d26fa98facc66f75c15c6f707c8690
-
SHA1
8f9605a8c95f50593e72d1847e51076ebc76040b
-
SHA256
50aa201729e7959d32663887003c23ed48ad087f5295009d68662566c1b22dcc
-
SHA512
118ac81ed568ed9fc1bfea2021046969ba3f9b8b96adb5e1d715e7186d2e2badb452c2c8819c76082757b43caccbab2a13d9b187e200d67dc5302c7ccc385502
-
SSDEEP
1536:MP1yCugTdpTc5XnzNEQyesvPX2o2pYv8HOo0l9wXRghTNNkTnIQgCMLJpKj3:MP0gdVGBEQyBPv2pYTok98IqvMLv
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5