General
-
Target
1846b9dbbf940d21f082548e08f885ea3f8a9dff51a6bd70b7059d2c026d7788.exe
-
Size
120KB
-
Sample
241225-3gspes1qgl
-
MD5
3b75efc01263a7261178365ce8443fad
-
SHA1
5f27347a519056415edaac7e1447472f6d2baf50
-
SHA256
1846b9dbbf940d21f082548e08f885ea3f8a9dff51a6bd70b7059d2c026d7788
-
SHA512
3ec22c12b96c203cce6a89b09159b23d3a3fa2dc4cacfb7852573f2e930d6a68f1e2c1515682efa68081bc6e4e6bcf2f1edfcb7c35cb61c572a971d8428861b3
-
SSDEEP
3072:R1knIc3dOlrowGtnjWVGmLW8vT6vyn/nyBTG:RGnZOlROjDz8rpnA6
Static task
static1
Behavioral task
behavioral1
Sample
1846b9dbbf940d21f082548e08f885ea3f8a9dff51a6bd70b7059d2c026d7788.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1846b9dbbf940d21f082548e08f885ea3f8a9dff51a6bd70b7059d2c026d7788.exe
-
Size
120KB
-
MD5
3b75efc01263a7261178365ce8443fad
-
SHA1
5f27347a519056415edaac7e1447472f6d2baf50
-
SHA256
1846b9dbbf940d21f082548e08f885ea3f8a9dff51a6bd70b7059d2c026d7788
-
SHA512
3ec22c12b96c203cce6a89b09159b23d3a3fa2dc4cacfb7852573f2e930d6a68f1e2c1515682efa68081bc6e4e6bcf2f1edfcb7c35cb61c572a971d8428861b3
-
SSDEEP
3072:R1knIc3dOlrowGtnjWVGmLW8vT6vyn/nyBTG:RGnZOlROjDz8rpnA6
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5