General
-
Target
e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a.exe
-
Size
120KB
-
Sample
241226-yxme5axrgq
-
MD5
8a5abb8fa71c6700510f6e128504977a
-
SHA1
60dc2c03116c64c498cded1c4516602381e50c1a
-
SHA256
e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a
-
SHA512
0ecf4afbfbe119540254ea3e2abea467ec6b7737c15c52473e15a53098676f0cfc4930867f05ab23e3fad62fcd37d8a6b5455aff7750f7741d5a5d40d4915620
-
SSDEEP
1536:u49NCEapfeZnWSkBUGJ32Wlr+EchS7ibXMfmleUcN+sE57mn+3gQuOWSgG0CCEQm:V9c9qFk3p2W1ZcJbeQeUi+H2q/WSgJET
Static task
static1
Behavioral task
behavioral1
Sample
e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a.exe
-
Size
120KB
-
MD5
8a5abb8fa71c6700510f6e128504977a
-
SHA1
60dc2c03116c64c498cded1c4516602381e50c1a
-
SHA256
e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a
-
SHA512
0ecf4afbfbe119540254ea3e2abea467ec6b7737c15c52473e15a53098676f0cfc4930867f05ab23e3fad62fcd37d8a6b5455aff7750f7741d5a5d40d4915620
-
SSDEEP
1536:u49NCEapfeZnWSkBUGJ32Wlr+EchS7ibXMfmleUcN+sE57mn+3gQuOWSgG0CCEQm:V9c9qFk3p2W1ZcJbeQeUi+H2q/WSgJET
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5