General
-
Target
55fc186ff1746373b2c42d684385360c4c86017035a512efcee6007924520c45N.exe
-
Size
120KB
-
Sample
241222-l3l1bstmgy
-
MD5
4ebfe861cceefdbfa5135c53048df9c0
-
SHA1
8825de5b8b34a7e6d409bcfd4d65648e392538dd
-
SHA256
55fc186ff1746373b2c42d684385360c4c86017035a512efcee6007924520c45
-
SHA512
22112c37cf22c748207b9ae1f0f5ed25af71a1fae9f4f5ad279424c05ee0d671e659281ed0334457c35d1567dc0df8511e1b7868bc08d0e23df97d0cf062c118
-
SSDEEP
1536:4cnYeEBkSV0HPMpGaoVXqK+gOdSIwoiGbpQAPsa7Slkb8izjTP8Eqa6aNYlqc5e5:gNBoSGZpgghGbpQIsaelGJTP+IWJ5e
Static task
static1
Behavioral task
behavioral1
Sample
55fc186ff1746373b2c42d684385360c4c86017035a512efcee6007924520c45N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
55fc186ff1746373b2c42d684385360c4c86017035a512efcee6007924520c45N.exe
-
Size
120KB
-
MD5
4ebfe861cceefdbfa5135c53048df9c0
-
SHA1
8825de5b8b34a7e6d409bcfd4d65648e392538dd
-
SHA256
55fc186ff1746373b2c42d684385360c4c86017035a512efcee6007924520c45
-
SHA512
22112c37cf22c748207b9ae1f0f5ed25af71a1fae9f4f5ad279424c05ee0d671e659281ed0334457c35d1567dc0df8511e1b7868bc08d0e23df97d0cf062c118
-
SSDEEP
1536:4cnYeEBkSV0HPMpGaoVXqK+gOdSIwoiGbpQAPsa7Slkb8izjTP8Eqa6aNYlqc5e5:gNBoSGZpgghGbpQIsaelGJTP+IWJ5e
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5