General
-
Target
e1014a4a4575c563c5c7d1838057d1693adba10b0ed3f598346bb46063e465a0
-
Size
120KB
-
Sample
241218-hh3kssxpf1
-
MD5
5f6a8897b195dc91807d2e2f86c3c55b
-
SHA1
5e212394455ff7eb24aa5b23269f5520ee892aa4
-
SHA256
e1014a4a4575c563c5c7d1838057d1693adba10b0ed3f598346bb46063e465a0
-
SHA512
09ef3c0d5082619319ef1d51b2c05a91d5474d659e5f6f0e852ec990a4bd1adfd2c3bee44cd5c062896028eb4e070093465e5710c7f8745e8bbba6c238e64c47
-
SSDEEP
1536:Zp4Aw/Mx/5fhQYUO/NzVWYVpWXALD/WTFg/1hOLevviDFpTFnC8hQqVhjsH1:ZprOMx/55yAdWyyFgrO4AFtZC8SqU
Static task
static1
Behavioral task
behavioral1
Sample
e1014a4a4575c563c5c7d1838057d1693adba10b0ed3f598346bb46063e465a0.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e1014a4a4575c563c5c7d1838057d1693adba10b0ed3f598346bb46063e465a0
-
Size
120KB
-
MD5
5f6a8897b195dc91807d2e2f86c3c55b
-
SHA1
5e212394455ff7eb24aa5b23269f5520ee892aa4
-
SHA256
e1014a4a4575c563c5c7d1838057d1693adba10b0ed3f598346bb46063e465a0
-
SHA512
09ef3c0d5082619319ef1d51b2c05a91d5474d659e5f6f0e852ec990a4bd1adfd2c3bee44cd5c062896028eb4e070093465e5710c7f8745e8bbba6c238e64c47
-
SSDEEP
1536:Zp4Aw/Mx/5fhQYUO/NzVWYVpWXALD/WTFg/1hOLevviDFpTFnC8hQqVhjsH1:ZprOMx/55yAdWyyFgrO4AFtZC8SqU
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5