General
-
Target
f0dc7863a233d80567f9413b85674942d4b9f5f71ea3473c86a03246c85490a4N.exe
-
Size
120KB
-
Sample
241218-nhkymswrct
-
MD5
ae5425fc0a7056183d8fbfa364f65f30
-
SHA1
10b9909af9942a0c4fb3ca970b478835af587a9d
-
SHA256
f0dc7863a233d80567f9413b85674942d4b9f5f71ea3473c86a03246c85490a4
-
SHA512
8475cc41f4f638a8482f0d89d5bca666a53cb9681b6ef46b3186d42c5862ded956244eab86ee592d5de8b3b6861b0b5ff32e33be734d36ef76bf3410f90642b8
-
SSDEEP
1536:h598T7Ni137aeAo42o4pvUO+YYFnzJIZd+qvogrBTOuIn+IHBDJHlz26huYw0EW:z98T4pHAU6RlzJIZ8pgrhOuEhhD7K1
Static task
static1
Behavioral task
behavioral1
Sample
f0dc7863a233d80567f9413b85674942d4b9f5f71ea3473c86a03246c85490a4N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f0dc7863a233d80567f9413b85674942d4b9f5f71ea3473c86a03246c85490a4N.exe
-
Size
120KB
-
MD5
ae5425fc0a7056183d8fbfa364f65f30
-
SHA1
10b9909af9942a0c4fb3ca970b478835af587a9d
-
SHA256
f0dc7863a233d80567f9413b85674942d4b9f5f71ea3473c86a03246c85490a4
-
SHA512
8475cc41f4f638a8482f0d89d5bca666a53cb9681b6ef46b3186d42c5862ded956244eab86ee592d5de8b3b6861b0b5ff32e33be734d36ef76bf3410f90642b8
-
SSDEEP
1536:h598T7Ni137aeAo42o4pvUO+YYFnzJIZd+qvogrBTOuIn+IHBDJHlz26huYw0EW:z98T4pHAU6RlzJIZ8pgrhOuEhhD7K1
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5