General
-
Target
723e17231fdef21339d97c9c86346ab1bd1b141bbedff19d208e27452e80efdcN.exe
-
Size
120KB
-
Sample
241218-gptqssxmfk
-
MD5
f525dc337f911206a1d62ae4475c67d0
-
SHA1
a6e13b68a025410221f4fa39a9781dd3d4f76ea4
-
SHA256
723e17231fdef21339d97c9c86346ab1bd1b141bbedff19d208e27452e80efdc
-
SHA512
fcaba207ebb2421bbf395ce75101e0551f82018288ebcc07adcb3595e712bd228224d4ea7b556616dd963cb5d795691274e47e3e1ab0af7e6dcfe4f47463033a
-
SSDEEP
3072:uBofxvDEaFOTQ2rAvs2UuVHKWy9yRC8gKIsA8RuO:uCJvrFKQF7r7y9ttKIsUO
Static task
static1
Behavioral task
behavioral1
Sample
723e17231fdef21339d97c9c86346ab1bd1b141bbedff19d208e27452e80efdcN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
723e17231fdef21339d97c9c86346ab1bd1b141bbedff19d208e27452e80efdcN.exe
-
Size
120KB
-
MD5
f525dc337f911206a1d62ae4475c67d0
-
SHA1
a6e13b68a025410221f4fa39a9781dd3d4f76ea4
-
SHA256
723e17231fdef21339d97c9c86346ab1bd1b141bbedff19d208e27452e80efdc
-
SHA512
fcaba207ebb2421bbf395ce75101e0551f82018288ebcc07adcb3595e712bd228224d4ea7b556616dd963cb5d795691274e47e3e1ab0af7e6dcfe4f47463033a
-
SSDEEP
3072:uBofxvDEaFOTQ2rAvs2UuVHKWy9yRC8gKIsA8RuO:uCJvrFKQF7r7y9ttKIsUO
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5