General
-
Target
5e61144e2b1aacff3883d750559a1c0a74c4c638a5a88505ac9a1f786ffd417a.exe
-
Size
120KB
-
Sample
241221-3sn6davkgp
-
MD5
df75314c9a29d3853fb0eb4bb75b20c3
-
SHA1
113f5938e74244d82b523b50a8341cc868a76a1c
-
SHA256
5e61144e2b1aacff3883d750559a1c0a74c4c638a5a88505ac9a1f786ffd417a
-
SHA512
c94a83179be2314d291ae9ef0f2c62596340bc988b73609432cd6904643c63114409873cdecd7b0cd7101fb89e8ff210fc45c88c62a38037331f2696ef8d22c4
-
SSDEEP
1536:4cnYeEBkSV0HPMpGaoVXqK+gOdSIwoiGbpQAPsa7Slkb8izjTP8Eqa6aNYlqc5eo:gNBoSGZpgghGbpQIsaelGJTP+IWJ5eo
Static task
static1
Behavioral task
behavioral1
Sample
5e61144e2b1aacff3883d750559a1c0a74c4c638a5a88505ac9a1f786ffd417a.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5e61144e2b1aacff3883d750559a1c0a74c4c638a5a88505ac9a1f786ffd417a.exe
-
Size
120KB
-
MD5
df75314c9a29d3853fb0eb4bb75b20c3
-
SHA1
113f5938e74244d82b523b50a8341cc868a76a1c
-
SHA256
5e61144e2b1aacff3883d750559a1c0a74c4c638a5a88505ac9a1f786ffd417a
-
SHA512
c94a83179be2314d291ae9ef0f2c62596340bc988b73609432cd6904643c63114409873cdecd7b0cd7101fb89e8ff210fc45c88c62a38037331f2696ef8d22c4
-
SSDEEP
1536:4cnYeEBkSV0HPMpGaoVXqK+gOdSIwoiGbpQAPsa7Slkb8izjTP8Eqa6aNYlqc5eo:gNBoSGZpgghGbpQIsaelGJTP+IWJ5eo
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5