General
-
Target
96be8514b76908ca0077b19930dc20646814ecde2b686f98d9f04dc410b958e6.exe
-
Size
120KB
-
Sample
241218-gtq6gawnfz
-
MD5
f73c8ca987441f7656f866e04323b6b8
-
SHA1
93e7bd8daaed5c45a49f35debf73bb68301266f9
-
SHA256
96be8514b76908ca0077b19930dc20646814ecde2b686f98d9f04dc410b958e6
-
SHA512
02f7c875d6acc3691224802a54689dabea9dd6d9adffc25a3bc763c5cfa26ec0d42a0d0ee52c4b6b8b947e29bbb39e028778cdb090ac78b5a427841d350ff045
-
SSDEEP
1536:Y50oQpEBDumiJhOmFIpcI4LwJmhj71rubaRYP57X2ppwbxggZx6BNZ:EK8/iJApLJmV7Va6vfR3Z
Static task
static1
Behavioral task
behavioral1
Sample
96be8514b76908ca0077b19930dc20646814ecde2b686f98d9f04dc410b958e6.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
96be8514b76908ca0077b19930dc20646814ecde2b686f98d9f04dc410b958e6.exe
-
Size
120KB
-
MD5
f73c8ca987441f7656f866e04323b6b8
-
SHA1
93e7bd8daaed5c45a49f35debf73bb68301266f9
-
SHA256
96be8514b76908ca0077b19930dc20646814ecde2b686f98d9f04dc410b958e6
-
SHA512
02f7c875d6acc3691224802a54689dabea9dd6d9adffc25a3bc763c5cfa26ec0d42a0d0ee52c4b6b8b947e29bbb39e028778cdb090ac78b5a427841d350ff045
-
SSDEEP
1536:Y50oQpEBDumiJhOmFIpcI4LwJmhj71rubaRYP57X2ppwbxggZx6BNZ:EK8/iJApLJmV7Va6vfR3Z
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5