General
-
Target
4c0d192d4bc6fcb6942f678b312e884c2fe6c1675d30c958bedc304aab1dfe9eN.exe
-
Size
120KB
-
Sample
241225-23j4qs1kbs
-
MD5
c9a938207e18429730fc615aed796290
-
SHA1
4981d4e1868e801bb046537c4f9b46fe32ec421c
-
SHA256
4c0d192d4bc6fcb6942f678b312e884c2fe6c1675d30c958bedc304aab1dfe9e
-
SHA512
2ec7c34dcdd7aa2a5321ff1bc15092ff10e55057b5a14cc7a59fccf8cdb603cb09738d4ccf270fc7052c292a57ebfa45baee0f3b27aa98f3093e9633a4f66c68
-
SSDEEP
1536:A+NXsattc/Gb+99f//CHSr9LCakENI/Z3MthEVB7hhD2iq1TntNHei4pA0ON:A+NpfcJflr92MiNeEVDhD2VBneB3O
Static task
static1
Behavioral task
behavioral1
Sample
4c0d192d4bc6fcb6942f678b312e884c2fe6c1675d30c958bedc304aab1dfe9eN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4c0d192d4bc6fcb6942f678b312e884c2fe6c1675d30c958bedc304aab1dfe9eN.exe
-
Size
120KB
-
MD5
c9a938207e18429730fc615aed796290
-
SHA1
4981d4e1868e801bb046537c4f9b46fe32ec421c
-
SHA256
4c0d192d4bc6fcb6942f678b312e884c2fe6c1675d30c958bedc304aab1dfe9e
-
SHA512
2ec7c34dcdd7aa2a5321ff1bc15092ff10e55057b5a14cc7a59fccf8cdb603cb09738d4ccf270fc7052c292a57ebfa45baee0f3b27aa98f3093e9633a4f66c68
-
SSDEEP
1536:A+NXsattc/Gb+99f//CHSr9LCakENI/Z3MthEVB7hhD2iq1TntNHei4pA0ON:A+NpfcJflr92MiNeEVDhD2VBneB3O
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5