General
-
Target
33d64b84bbc2839a55f708c8042ca88e7ab2ebe2535ee9d6209ce98f3a6fecae.exe
-
Size
120KB
-
Sample
241221-2sefhasmhv
-
MD5
0966aa53b6e763170b066788a71a5ed2
-
SHA1
7171398ce4a828d49a1bec5e1026106eeb4dd606
-
SHA256
33d64b84bbc2839a55f708c8042ca88e7ab2ebe2535ee9d6209ce98f3a6fecae
-
SHA512
2ff1cbb50d8690f4f634465456b0fd768cafe10d0822aabeb0206058404322d39188720bd849638d48f2a972da1e9ca94a65bfae5ff5969c90b6695c786e5d23
-
SSDEEP
3072:9Desm00b7D3uMema1OVWRyYbXuB8Is9902zN8oPbG5RP:9y0avcOVW0H8DWoPbSRP
Static task
static1
Behavioral task
behavioral1
Sample
33d64b84bbc2839a55f708c8042ca88e7ab2ebe2535ee9d6209ce98f3a6fecae.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
33d64b84bbc2839a55f708c8042ca88e7ab2ebe2535ee9d6209ce98f3a6fecae.exe
-
Size
120KB
-
MD5
0966aa53b6e763170b066788a71a5ed2
-
SHA1
7171398ce4a828d49a1bec5e1026106eeb4dd606
-
SHA256
33d64b84bbc2839a55f708c8042ca88e7ab2ebe2535ee9d6209ce98f3a6fecae
-
SHA512
2ff1cbb50d8690f4f634465456b0fd768cafe10d0822aabeb0206058404322d39188720bd849638d48f2a972da1e9ca94a65bfae5ff5969c90b6695c786e5d23
-
SSDEEP
3072:9Desm00b7D3uMema1OVWRyYbXuB8Is9902zN8oPbG5RP:9y0avcOVW0H8DWoPbSRP
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5