General
-
Target
86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2fN.exe
-
Size
120KB
-
Sample
241222-bal5hswrhl
-
MD5
62d5db681d09cb244ed075b7c52c9870
-
SHA1
6ffb00c56dd02be775881a6fd52c7c85f4042e0e
-
SHA256
86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2f
-
SHA512
ce80cd58d02aa705e24aa8c3da155cbafa7f7330c712d4c89704cd1de42cc3842934cba93cfaf5e7719762a910d0fb79e8926d1ad793616d3f526367b8514365
-
SSDEEP
3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0:PObtD18gJqfD6FUL5+kfa0
Static task
static1
Behavioral task
behavioral1
Sample
86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2fN.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2fN.exe
-
Size
120KB
-
MD5
62d5db681d09cb244ed075b7c52c9870
-
SHA1
6ffb00c56dd02be775881a6fd52c7c85f4042e0e
-
SHA256
86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2f
-
SHA512
ce80cd58d02aa705e24aa8c3da155cbafa7f7330c712d4c89704cd1de42cc3842934cba93cfaf5e7719762a910d0fb79e8926d1ad793616d3f526367b8514365
-
SSDEEP
3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0:PObtD18gJqfD6FUL5+kfa0
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5