General
-
Target
36f50d2fefd969fb4dd06cbb55f441a757e86eb4e51a5dd61ccffff5eafd2c3c.exe
-
Size
120KB
-
Sample
241226-l8vvestjcl
-
MD5
dffd146f9e2306f3123311f5cc429def
-
SHA1
5445ddee4f18d7c9255817d549e4282e6fc42008
-
SHA256
36f50d2fefd969fb4dd06cbb55f441a757e86eb4e51a5dd61ccffff5eafd2c3c
-
SHA512
23579c5f3c6d4f2a8e42ca246379ebc538ee64878108fbaaffa8a324329188bf699cc8124b448fade43a2a042e39f85256526a77b28828ac6679f5c7003429cf
-
SSDEEP
1536:lCAjrNEEy0/c2pD0+2ZeZvuvN+nU0p0+zKsJW8bUoH0pKbq7pntbr692XSXu99U:8AjrNEXQ0+SuGvcnpvlzUEYtbr692XXy
Static task
static1
Behavioral task
behavioral1
Sample
36f50d2fefd969fb4dd06cbb55f441a757e86eb4e51a5dd61ccffff5eafd2c3c.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
36f50d2fefd969fb4dd06cbb55f441a757e86eb4e51a5dd61ccffff5eafd2c3c.exe
-
Size
120KB
-
MD5
dffd146f9e2306f3123311f5cc429def
-
SHA1
5445ddee4f18d7c9255817d549e4282e6fc42008
-
SHA256
36f50d2fefd969fb4dd06cbb55f441a757e86eb4e51a5dd61ccffff5eafd2c3c
-
SHA512
23579c5f3c6d4f2a8e42ca246379ebc538ee64878108fbaaffa8a324329188bf699cc8124b448fade43a2a042e39f85256526a77b28828ac6679f5c7003429cf
-
SSDEEP
1536:lCAjrNEEy0/c2pD0+2ZeZvuvN+nU0p0+zKsJW8bUoH0pKbq7pntbr692XSXu99U:8AjrNEXQ0+SuGvcnpvlzUEYtbr692XXy
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5