General
-
Target
e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22.exe
-
Size
654KB
-
Sample
241218-ghgsnaxkdm
-
MD5
926fd7ad60304c5c300af3075dd8522d
-
SHA1
0aedfeda0a58abe4e2f52bbef05df441bd20c0dc
-
SHA256
e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22
-
SHA512
76f2b28df2d65e1eae328838e358b0bdf8b37aa23e62c63102ef48dbee2546e7bea45e356a8ffa319e9903de75a972006a1ac7df3e13fbc10220fdf024644ab5
-
SSDEEP
12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1c:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYc
Static task
static1
Behavioral task
behavioral1
Sample
e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22.exe
-
Size
654KB
-
MD5
926fd7ad60304c5c300af3075dd8522d
-
SHA1
0aedfeda0a58abe4e2f52bbef05df441bd20c0dc
-
SHA256
e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22
-
SHA512
76f2b28df2d65e1eae328838e358b0bdf8b37aa23e62c63102ef48dbee2546e7bea45e356a8ffa319e9903de75a972006a1ac7df3e13fbc10220fdf024644ab5
-
SSDEEP
12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1c:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYc
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5