General
-
Target
fd8329b8b65f2f72fc1561f8bfc61ac5c5f9b09345e8363ab1ed5165fa4ede2eN.exe
-
Size
120KB
-
Sample
241222-tk2xtstkgn
-
MD5
434299655005ce8de6d6486d551aa1a0
-
SHA1
6d0e691da598ec75df61a2ac4a65a101cd00fada
-
SHA256
fd8329b8b65f2f72fc1561f8bfc61ac5c5f9b09345e8363ab1ed5165fa4ede2e
-
SHA512
ab7b13eaa68d2bbb686c829bf8fddeb1cad61a89bc79f9e4f1aa54beea14600c9f1242f0d797ae490b83f9778657895fe32dbf21bcf8409c9f3a101aef52084d
-
SSDEEP
1536:mOolqh//mx2ljgbbhLui5iIlF8Co75uFL9Dcm3e9ay75nn5/kucG/937dOdPY:mOWxN3hzoYV9DRgnnlkuco937d+Y
Static task
static1
Behavioral task
behavioral1
Sample
fd8329b8b65f2f72fc1561f8bfc61ac5c5f9b09345e8363ab1ed5165fa4ede2eN.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fd8329b8b65f2f72fc1561f8bfc61ac5c5f9b09345e8363ab1ed5165fa4ede2eN.exe
-
Size
120KB
-
MD5
434299655005ce8de6d6486d551aa1a0
-
SHA1
6d0e691da598ec75df61a2ac4a65a101cd00fada
-
SHA256
fd8329b8b65f2f72fc1561f8bfc61ac5c5f9b09345e8363ab1ed5165fa4ede2e
-
SHA512
ab7b13eaa68d2bbb686c829bf8fddeb1cad61a89bc79f9e4f1aa54beea14600c9f1242f0d797ae490b83f9778657895fe32dbf21bcf8409c9f3a101aef52084d
-
SSDEEP
1536:mOolqh//mx2ljgbbhLui5iIlF8Co75uFL9Dcm3e9ay75nn5/kucG/937dOdPY:mOWxN3hzoYV9DRgnnlkuco937d+Y
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5