General
-
Target
d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9dfN.exe
-
Size
120KB
-
Sample
241217-qgr2nsznas
-
MD5
ab139edb1ac4d30807c2c1aa7ebd3600
-
SHA1
7ebbc11af25f01455f6233d4b132c0d9110aa0c1
-
SHA256
d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9df
-
SHA512
b8dd8cdb0a363e20e6383d0bbca1e002fec53ea8be1e21b8a1382214b285926a2222d9a1c9c5f700e1e88de269e632b96ae900874bdc4581e7799c8c9ab25cbe
-
SSDEEP
3072:soBFxb8t20SSVt0y5EkMuKYKz0xDjWpe:NFxbM15X7KYKzaDjWpe
Static task
static1
Behavioral task
behavioral1
Sample
d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9dfN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9dfN.exe
-
Size
120KB
-
MD5
ab139edb1ac4d30807c2c1aa7ebd3600
-
SHA1
7ebbc11af25f01455f6233d4b132c0d9110aa0c1
-
SHA256
d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9df
-
SHA512
b8dd8cdb0a363e20e6383d0bbca1e002fec53ea8be1e21b8a1382214b285926a2222d9a1c9c5f700e1e88de269e632b96ae900874bdc4581e7799c8c9ab25cbe
-
SSDEEP
3072:soBFxb8t20SSVt0y5EkMuKYKz0xDjWpe:NFxbM15X7KYKzaDjWpe
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5