General
-
Target
4ce49f90ed3fe7b87f65f06a4869d1cb5571676366055faa3a2aa804198ed441.exe
-
Size
120KB
-
Sample
241221-2bkk7a1qdw
-
MD5
65af5dcd5b3e7ca4611f39ceac0793d6
-
SHA1
f9be32490a2236eee089fc0747d23a35973c7750
-
SHA256
4ce49f90ed3fe7b87f65f06a4869d1cb5571676366055faa3a2aa804198ed441
-
SHA512
eb1fa6d6658f7151cc18adeefb6ac967da85a19559354cc2f4436949d4669460baf9680a4fc5d2b3a54342f364866b6e15c38c1458607b5a3e01333965c41654
-
SSDEEP
1536:x3Y5OdlsWrwDQ2V+bwtSYx6kRsQqQjm4bIrZ+nIItiHug2xeGjPRcTHCClb+7:+5/WkJ+bzE6kUIm4bAknDiAx3Vxx7
Static task
static1
Behavioral task
behavioral1
Sample
4ce49f90ed3fe7b87f65f06a4869d1cb5571676366055faa3a2aa804198ed441.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4ce49f90ed3fe7b87f65f06a4869d1cb5571676366055faa3a2aa804198ed441.exe
-
Size
120KB
-
MD5
65af5dcd5b3e7ca4611f39ceac0793d6
-
SHA1
f9be32490a2236eee089fc0747d23a35973c7750
-
SHA256
4ce49f90ed3fe7b87f65f06a4869d1cb5571676366055faa3a2aa804198ed441
-
SHA512
eb1fa6d6658f7151cc18adeefb6ac967da85a19559354cc2f4436949d4669460baf9680a4fc5d2b3a54342f364866b6e15c38c1458607b5a3e01333965c41654
-
SSDEEP
1536:x3Y5OdlsWrwDQ2V+bwtSYx6kRsQqQjm4bIrZ+nIItiHug2xeGjPRcTHCClb+7:+5/WkJ+bzE6kUIm4bAknDiAx3Vxx7
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5