General
-
Target
f74e1f0cdf3c938701c00b8a99c71c776e6fb2088bea1a086ad5ea7f6e639942N.exe
-
Size
120KB
-
Sample
241226-1s1s3aslaq
-
MD5
7daf2c5d67514e07e4f58e2b5b7ae190
-
SHA1
3952a2064fe5d17887f850aebc12a7d464b04b1d
-
SHA256
f74e1f0cdf3c938701c00b8a99c71c776e6fb2088bea1a086ad5ea7f6e639942
-
SHA512
1d09e7f1ee928fac5eea0015298af072ac2357c5b464c441f0cf336a9bedaa06e0ff5927b28bb60def8c0c21b92f121153342bb093144b101cb1573875c2fa2e
-
SSDEEP
3072:TDGP7+7YeTWfnLG+rEuwKAmudVwDDegbmD1w8:TDGHeTwLncNdVdDO8
Static task
static1
Behavioral task
behavioral1
Sample
f74e1f0cdf3c938701c00b8a99c71c776e6fb2088bea1a086ad5ea7f6e639942N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f74e1f0cdf3c938701c00b8a99c71c776e6fb2088bea1a086ad5ea7f6e639942N.exe
-
Size
120KB
-
MD5
7daf2c5d67514e07e4f58e2b5b7ae190
-
SHA1
3952a2064fe5d17887f850aebc12a7d464b04b1d
-
SHA256
f74e1f0cdf3c938701c00b8a99c71c776e6fb2088bea1a086ad5ea7f6e639942
-
SHA512
1d09e7f1ee928fac5eea0015298af072ac2357c5b464c441f0cf336a9bedaa06e0ff5927b28bb60def8c0c21b92f121153342bb093144b101cb1573875c2fa2e
-
SSDEEP
3072:TDGP7+7YeTWfnLG+rEuwKAmudVwDDegbmD1w8:TDGHeTwLncNdVdDO8
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5