General
-
Target
43646517cb1b49d0dbebc90eec3e212e472760555efd28da3147b7aa4be8eb00
-
Size
120KB
-
Sample
241219-21v38asmhz
-
MD5
ebde9bac28af7f02352c41e90a42b5e5
-
SHA1
3403917e7bed4e5d216aecbf7618f50cb0503a6b
-
SHA256
43646517cb1b49d0dbebc90eec3e212e472760555efd28da3147b7aa4be8eb00
-
SHA512
1312268b3d2ec38f9dce9529146fb80feb8357a11c1330c0490e6fc43520e21f381aa653e4bd2794eeafce39b4ab858648f8aef38dfcf0f8c0d8dc2604878148
-
SSDEEP
3072:H5bqAhEmOcWag7Yd3ngYDpDpPTl4LqQR:H5bqATRA/YtDTQ
Static task
static1
Behavioral task
behavioral1
Sample
43646517cb1b49d0dbebc90eec3e212e472760555efd28da3147b7aa4be8eb00.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
43646517cb1b49d0dbebc90eec3e212e472760555efd28da3147b7aa4be8eb00
-
Size
120KB
-
MD5
ebde9bac28af7f02352c41e90a42b5e5
-
SHA1
3403917e7bed4e5d216aecbf7618f50cb0503a6b
-
SHA256
43646517cb1b49d0dbebc90eec3e212e472760555efd28da3147b7aa4be8eb00
-
SHA512
1312268b3d2ec38f9dce9529146fb80feb8357a11c1330c0490e6fc43520e21f381aa653e4bd2794eeafce39b4ab858648f8aef38dfcf0f8c0d8dc2604878148
-
SSDEEP
3072:H5bqAhEmOcWag7Yd3ngYDpDpPTl4LqQR:H5bqATRA/YtDTQ
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5