General
-
Target
dc601c6691a2e0cef6a435bcd208eda44f5d2dd726d8cb190318743b095f3fa7N.exe
-
Size
120KB
-
Sample
241222-p3febsyrem
-
MD5
628df3fa2b3e32e263fc1a6057e0dbd0
-
SHA1
31501361958dd2a4d98fb0495d384827237344e7
-
SHA256
dc601c6691a2e0cef6a435bcd208eda44f5d2dd726d8cb190318743b095f3fa7
-
SHA512
13b27aa06d06b9b456a363bd110bd7d2965915f78b412c53b9bb0f89b07c09ebb2d86217b6d42fa87ddfd739358e3cb969914856bd1334559dfa8f638caeb1bc
-
SSDEEP
3072:9VIgjMrGSI6KVTRyTSML/dGyQfC4g/Ab:gbGSjKVTRySMLJQf1gw
Static task
static1
Behavioral task
behavioral1
Sample
dc601c6691a2e0cef6a435bcd208eda44f5d2dd726d8cb190318743b095f3fa7N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
dc601c6691a2e0cef6a435bcd208eda44f5d2dd726d8cb190318743b095f3fa7N.exe
-
Size
120KB
-
MD5
628df3fa2b3e32e263fc1a6057e0dbd0
-
SHA1
31501361958dd2a4d98fb0495d384827237344e7
-
SHA256
dc601c6691a2e0cef6a435bcd208eda44f5d2dd726d8cb190318743b095f3fa7
-
SHA512
13b27aa06d06b9b456a363bd110bd7d2965915f78b412c53b9bb0f89b07c09ebb2d86217b6d42fa87ddfd739358e3cb969914856bd1334559dfa8f638caeb1bc
-
SSDEEP
3072:9VIgjMrGSI6KVTRyTSML/dGyQfC4g/Ab:gbGSjKVTRySMLJQf1gw
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5