General
-
Target
174ec21c03b5b563046c1365883ab430c69e3a98a0800545a4a67f480752fadcN.exe
-
Size
120KB
-
Sample
241217-y9zk8axjh1
-
MD5
5122c0475c9353294a6de580ee379330
-
SHA1
036e4f960f558aae378d80c8945d9db03d184b33
-
SHA256
174ec21c03b5b563046c1365883ab430c69e3a98a0800545a4a67f480752fadc
-
SHA512
f0262b579b9a80753ccc1e6d038714390894e26c311cba3305a712eaa1b4068b733f63b50aef8357da5c26478b07bc11f6e15425110716e1b27bca5ef9115717
-
SSDEEP
3072:MkUaDkjCbY0yj6jpS7UA4gMUa81JzoQOkh:MkUaDk90k7UAbMUayhoLkh
Static task
static1
Behavioral task
behavioral1
Sample
174ec21c03b5b563046c1365883ab430c69e3a98a0800545a4a67f480752fadcN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
174ec21c03b5b563046c1365883ab430c69e3a98a0800545a4a67f480752fadcN.exe
-
Size
120KB
-
MD5
5122c0475c9353294a6de580ee379330
-
SHA1
036e4f960f558aae378d80c8945d9db03d184b33
-
SHA256
174ec21c03b5b563046c1365883ab430c69e3a98a0800545a4a67f480752fadc
-
SHA512
f0262b579b9a80753ccc1e6d038714390894e26c311cba3305a712eaa1b4068b733f63b50aef8357da5c26478b07bc11f6e15425110716e1b27bca5ef9115717
-
SSDEEP
3072:MkUaDkjCbY0yj6jpS7UA4gMUa81JzoQOkh:MkUaDk90k7UAbMUayhoLkh
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5