General
-
Target
4f4d4ca3c033589b86b27c8d02586000886e3ce487d1ef454d01220635fb13a9N.exe
-
Size
120KB
-
Sample
241222-n29fcaxjhz
-
MD5
b09ca1c724e23ea11c1e6bec53031fc0
-
SHA1
6a99bc479dc3447c295db0637608e508806d73b1
-
SHA256
4f4d4ca3c033589b86b27c8d02586000886e3ce487d1ef454d01220635fb13a9
-
SHA512
fb285f062ec926d377c952c0e060fe5d48ea59eb987a483486d835f82df6cfba4a6c63c00e3213c89f95d11df6b715c8922cd220653eabaf1d1b82ad88d58aae
-
SSDEEP
1536:zW33nb2aQNX9T0QQwVz1AxNaRAW13spw8wCcDhr67MXmB8T2:zWnnblEtptVKRW1spw8x6h2T82
Static task
static1
Behavioral task
behavioral1
Sample
4f4d4ca3c033589b86b27c8d02586000886e3ce487d1ef454d01220635fb13a9N.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4f4d4ca3c033589b86b27c8d02586000886e3ce487d1ef454d01220635fb13a9N.exe
-
Size
120KB
-
MD5
b09ca1c724e23ea11c1e6bec53031fc0
-
SHA1
6a99bc479dc3447c295db0637608e508806d73b1
-
SHA256
4f4d4ca3c033589b86b27c8d02586000886e3ce487d1ef454d01220635fb13a9
-
SHA512
fb285f062ec926d377c952c0e060fe5d48ea59eb987a483486d835f82df6cfba4a6c63c00e3213c89f95d11df6b715c8922cd220653eabaf1d1b82ad88d58aae
-
SSDEEP
1536:zW33nb2aQNX9T0QQwVz1AxNaRAW13spw8wCcDhr67MXmB8T2:zWnnblEtptVKRW1spw8x6h2T82
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5