General
-
Target
0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e.exe
-
Size
120KB
-
Sample
241218-h2zcgszngr
-
MD5
b8ce68f8c77f403203d00828a0e1b3fa
-
SHA1
1ddd2617ff4704ad6b071e691b6cbfdae1b755be
-
SHA256
0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e
-
SHA512
8dc82eac46f7450b49ebc6b5e59a45662a665429d312bb742809898313aacce04b2730a03a6ca92ade87e45b55924e6ebe73ecb8c91cec0138534bd90f1a368e
-
SSDEEP
3072:zv5nXerm4K0AdlZ9to51pCYaJXlZ5M7XGZlijkiIF:zNXWK0EhorpqhlZi7XG3ijIF
Static task
static1
Behavioral task
behavioral1
Sample
0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e.exe
-
Size
120KB
-
MD5
b8ce68f8c77f403203d00828a0e1b3fa
-
SHA1
1ddd2617ff4704ad6b071e691b6cbfdae1b755be
-
SHA256
0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e
-
SHA512
8dc82eac46f7450b49ebc6b5e59a45662a665429d312bb742809898313aacce04b2730a03a6ca92ade87e45b55924e6ebe73ecb8c91cec0138534bd90f1a368e
-
SSDEEP
3072:zv5nXerm4K0AdlZ9to51pCYaJXlZ5M7XGZlijkiIF:zNXWK0EhorpqhlZi7XG3ijIF
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5