General
-
Target
9fdd9ec73f17e6f7c14c4acfce5e6aaa421bce33f0671a6dee1b994255bcc3e4N.exe
-
Size
120KB
-
Sample
241225-2rxwfs1lcr
-
MD5
6e5bf2550ca4b4899744667269d217a0
-
SHA1
28112f5419ca8b1006dc64eed16571cc13b00bd9
-
SHA256
9fdd9ec73f17e6f7c14c4acfce5e6aaa421bce33f0671a6dee1b994255bcc3e4
-
SHA512
1e6b1d628bd59436659814700268f7bb26a5055da2026e5411fdb44c42948b71801b91b501e23ecc9a6da6ebb1e91e6f7aa000107917f6f2f5a3a3806622b06f
-
SSDEEP
1536:agm6p1Fy3dxTqlP5zXb2HKBKe2NwN4XGNgaYrPLAjIhcw4hifQ5Bjx6U/6fTI4bD:/LwAdqHoKe2NwSXLP4Ihc52QzF8xNKK
Static task
static1
Behavioral task
behavioral1
Sample
9fdd9ec73f17e6f7c14c4acfce5e6aaa421bce33f0671a6dee1b994255bcc3e4N.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9fdd9ec73f17e6f7c14c4acfce5e6aaa421bce33f0671a6dee1b994255bcc3e4N.exe
-
Size
120KB
-
MD5
6e5bf2550ca4b4899744667269d217a0
-
SHA1
28112f5419ca8b1006dc64eed16571cc13b00bd9
-
SHA256
9fdd9ec73f17e6f7c14c4acfce5e6aaa421bce33f0671a6dee1b994255bcc3e4
-
SHA512
1e6b1d628bd59436659814700268f7bb26a5055da2026e5411fdb44c42948b71801b91b501e23ecc9a6da6ebb1e91e6f7aa000107917f6f2f5a3a3806622b06f
-
SSDEEP
1536:agm6p1Fy3dxTqlP5zXb2HKBKe2NwN4XGNgaYrPLAjIhcw4hifQ5Bjx6U/6fTI4bD:/LwAdqHoKe2NwSXLP4Ihc52QzF8xNKK
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5