General
-
Target
2b222bef5d4ac376ef38433bc2332d1dba9c06373f1ee870211c01b39c80e6c9N.exe
-
Size
120KB
-
Sample
241222-a155mswpbk
-
MD5
69231524b636d5a98326a9bf154aa310
-
SHA1
f5e6e227b73ddce2deb147aba7bb6b8979bd3096
-
SHA256
2b222bef5d4ac376ef38433bc2332d1dba9c06373f1ee870211c01b39c80e6c9
-
SHA512
eed467eb98d6a7c44181d7c884b43785ac1269e149a39954a05804204472d2267201fc443d4f589d093da1ad75fcf175a1c0181fd09161ab277283d5d824b037
-
SSDEEP
1536:48mBsobH7Py8kFWQPbg09WkAniKUqJUnmcfEv/yh17qV+pIQcl0VmZPSV:4XsZNFW+gcWqqJ4sCn7qsIZ/Zq
Static task
static1
Behavioral task
behavioral1
Sample
2b222bef5d4ac376ef38433bc2332d1dba9c06373f1ee870211c01b39c80e6c9N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2b222bef5d4ac376ef38433bc2332d1dba9c06373f1ee870211c01b39c80e6c9N.exe
-
Size
120KB
-
MD5
69231524b636d5a98326a9bf154aa310
-
SHA1
f5e6e227b73ddce2deb147aba7bb6b8979bd3096
-
SHA256
2b222bef5d4ac376ef38433bc2332d1dba9c06373f1ee870211c01b39c80e6c9
-
SHA512
eed467eb98d6a7c44181d7c884b43785ac1269e149a39954a05804204472d2267201fc443d4f589d093da1ad75fcf175a1c0181fd09161ab277283d5d824b037
-
SSDEEP
1536:48mBsobH7Py8kFWQPbg09WkAniKUqJUnmcfEv/yh17qV+pIQcl0VmZPSV:4XsZNFW+gcWqqJ4sCn7qsIZ/Zq
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5