General
-
Target
a9be046d5ca4dc176b807c136550a4780136a9549667e7253a5bd6195ffaf679.exe
-
Size
120KB
-
Sample
241225-wwrx4s1qby
-
MD5
5cab94ffd05e725b9d27b31ccf48582f
-
SHA1
76b24b68fbc531386510bb11b8948d22c833cd30
-
SHA256
a9be046d5ca4dc176b807c136550a4780136a9549667e7253a5bd6195ffaf679
-
SHA512
e99363169c15eed4e3e5a1edcc7fc5781a37893420c9ac3d138e05890d4577431c90767ec025667a89dde2b0a67103dc10fe0e3cc7cde5eda7b377332294696f
-
SSDEEP
1536:agm6p1Fy3dxTqlP5zXb2HKBKe2NwN4XGNgaYrPLAjIhcw4hifQ5Bjx6U/6fTI4bd:/LwAdqHoKe2NwSXLP4Ihc52QzF8xNKKF
Static task
static1
Behavioral task
behavioral1
Sample
a9be046d5ca4dc176b807c136550a4780136a9549667e7253a5bd6195ffaf679.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a9be046d5ca4dc176b807c136550a4780136a9549667e7253a5bd6195ffaf679.exe
-
Size
120KB
-
MD5
5cab94ffd05e725b9d27b31ccf48582f
-
SHA1
76b24b68fbc531386510bb11b8948d22c833cd30
-
SHA256
a9be046d5ca4dc176b807c136550a4780136a9549667e7253a5bd6195ffaf679
-
SHA512
e99363169c15eed4e3e5a1edcc7fc5781a37893420c9ac3d138e05890d4577431c90767ec025667a89dde2b0a67103dc10fe0e3cc7cde5eda7b377332294696f
-
SSDEEP
1536:agm6p1Fy3dxTqlP5zXb2HKBKe2NwN4XGNgaYrPLAjIhcw4hifQ5Bjx6U/6fTI4bd:/LwAdqHoKe2NwSXLP4Ihc52QzF8xNKKF
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5