General
-
Target
710c93298431c3f73b3aac53d0a15106f3678d3b24d34f017b314a14b7ff5120.exe
-
Size
120KB
-
Sample
241226-yepsjaxjbk
-
MD5
05e7fcb40c376a3312aca4bf54ea8c0e
-
SHA1
2ef02b2c4fff7e3e24bc0569583a0de278deaf7a
-
SHA256
710c93298431c3f73b3aac53d0a15106f3678d3b24d34f017b314a14b7ff5120
-
SHA512
d82a23f7921531c55c7fba46847c429dc00d0e79f49dc764e0ea1dbd13ec390af0e0c4a9b5c297bba6b49ade39a0a149b1989b10cb882456b8b1f8e1bd3e19c5
-
SSDEEP
1536:KIVHRofqtQwOM4lyyjo99elUnSEFYhHbHlaClfgkjRmA7oZoT1wCMOBTXrdt:KIAqtQgg0remgJbHlaAfgIRvBTBJ/t
Static task
static1
Behavioral task
behavioral1
Sample
710c93298431c3f73b3aac53d0a15106f3678d3b24d34f017b314a14b7ff5120.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
710c93298431c3f73b3aac53d0a15106f3678d3b24d34f017b314a14b7ff5120.exe
-
Size
120KB
-
MD5
05e7fcb40c376a3312aca4bf54ea8c0e
-
SHA1
2ef02b2c4fff7e3e24bc0569583a0de278deaf7a
-
SHA256
710c93298431c3f73b3aac53d0a15106f3678d3b24d34f017b314a14b7ff5120
-
SHA512
d82a23f7921531c55c7fba46847c429dc00d0e79f49dc764e0ea1dbd13ec390af0e0c4a9b5c297bba6b49ade39a0a149b1989b10cb882456b8b1f8e1bd3e19c5
-
SSDEEP
1536:KIVHRofqtQwOM4lyyjo99elUnSEFYhHbHlaClfgkjRmA7oZoT1wCMOBTXrdt:KIAqtQgg0remgJbHlaAfgIRvBTBJ/t
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5