General
-
Target
f497e226c4dddc8194b687cb79e3102928fb971ed81d2eb9ac639d27d0ed4b69.exe
-
Size
120KB
-
Sample
241217-qhxnjszncv
-
MD5
c72a757959132929431ccf78971a4bfc
-
SHA1
aa0fbccd74a2d589e9ef4c622438ec6b681021ef
-
SHA256
f497e226c4dddc8194b687cb79e3102928fb971ed81d2eb9ac639d27d0ed4b69
-
SHA512
60d666fd8a3f63cb5d671bd201ee7db4d7c8aad7918fb734f76d057f6f015f8d5dac492bcbcffc743e49400c7e5430276cdd4492fabbc492a2eede5a4a89b746
-
SSDEEP
3072:zOzaSIrRbarug/0Jm1FvUicU7qhwFPD6AWiEMK7:Sa0ugMJLib+wFPOf7
Static task
static1
Behavioral task
behavioral1
Sample
f497e226c4dddc8194b687cb79e3102928fb971ed81d2eb9ac639d27d0ed4b69.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f497e226c4dddc8194b687cb79e3102928fb971ed81d2eb9ac639d27d0ed4b69.exe
-
Size
120KB
-
MD5
c72a757959132929431ccf78971a4bfc
-
SHA1
aa0fbccd74a2d589e9ef4c622438ec6b681021ef
-
SHA256
f497e226c4dddc8194b687cb79e3102928fb971ed81d2eb9ac639d27d0ed4b69
-
SHA512
60d666fd8a3f63cb5d671bd201ee7db4d7c8aad7918fb734f76d057f6f015f8d5dac492bcbcffc743e49400c7e5430276cdd4492fabbc492a2eede5a4a89b746
-
SSDEEP
3072:zOzaSIrRbarug/0Jm1FvUicU7qhwFPD6AWiEMK7:Sa0ugMJLib+wFPOf7
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5