General
-
Target
5b0e87a3bb38c7be1cc3542b958ab0b1e3d4d1e6382af768f33745a03f9c470dN.exe
-
Size
120KB
-
Sample
241217-z9d5yszjhm
-
MD5
2646f72741aae238f6adb0fbfa3b3e00
-
SHA1
21838b72bb6e9181984990303b9dd6076b88142c
-
SHA256
5b0e87a3bb38c7be1cc3542b958ab0b1e3d4d1e6382af768f33745a03f9c470d
-
SHA512
ab75ad189837540f93579acfe416d6380ea6a98a250df6757c6e120b88b146ff101ade5da7750ef930de736da2230ca9e09c60dd114ae536e325c7df74e8e761
-
SSDEEP
1536:TA3ArEUg3gbtrwC7CXny9Tpdpv0/jExPq9uX+DdKLkRJqGhmxJdf54MN9mrjK5:83fUdJwCO3ylpvVX+hKowGgxPCI3
Static task
static1
Behavioral task
behavioral1
Sample
5b0e87a3bb38c7be1cc3542b958ab0b1e3d4d1e6382af768f33745a03f9c470dN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5b0e87a3bb38c7be1cc3542b958ab0b1e3d4d1e6382af768f33745a03f9c470dN.exe
-
Size
120KB
-
MD5
2646f72741aae238f6adb0fbfa3b3e00
-
SHA1
21838b72bb6e9181984990303b9dd6076b88142c
-
SHA256
5b0e87a3bb38c7be1cc3542b958ab0b1e3d4d1e6382af768f33745a03f9c470d
-
SHA512
ab75ad189837540f93579acfe416d6380ea6a98a250df6757c6e120b88b146ff101ade5da7750ef930de736da2230ca9e09c60dd114ae536e325c7df74e8e761
-
SSDEEP
1536:TA3ArEUg3gbtrwC7CXny9Tpdpv0/jExPq9uX+DdKLkRJqGhmxJdf54MN9mrjK5:83fUdJwCO3ylpvVX+hKowGgxPCI3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5