General
-
Target
e10eb5e3b9b57dbfe2de08417797f5244015476fe6051bd1a337972f1fb1279a
-
Size
120KB
-
Sample
241228-d6cxtsvrhp
-
MD5
59de271ac98c02584c098508a72581ff
-
SHA1
34082a61f82daf66f6404f9ec58871730c001dca
-
SHA256
e10eb5e3b9b57dbfe2de08417797f5244015476fe6051bd1a337972f1fb1279a
-
SHA512
78697ebe879a29f2ac922bd1f9a9bfccf343937e4ea61dcc4bda8630d883e2e8dfce5e4a2bd5a03ddbaa1f5f2da59f62460e4ac1a5b7ac26c5ada72ab8b41de0
-
SSDEEP
1536:FDJLeDCOMhWY7essl3CNi+pwGk8FAS0pGzQoTXACzp6WTQhAGA9z6xFt5lvC:N1UYdisslyc+pG8FSX8SW8U9z6Dvl
Static task
static1
Behavioral task
behavioral1
Sample
e10eb5e3b9b57dbfe2de08417797f5244015476fe6051bd1a337972f1fb1279a.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e10eb5e3b9b57dbfe2de08417797f5244015476fe6051bd1a337972f1fb1279a
-
Size
120KB
-
MD5
59de271ac98c02584c098508a72581ff
-
SHA1
34082a61f82daf66f6404f9ec58871730c001dca
-
SHA256
e10eb5e3b9b57dbfe2de08417797f5244015476fe6051bd1a337972f1fb1279a
-
SHA512
78697ebe879a29f2ac922bd1f9a9bfccf343937e4ea61dcc4bda8630d883e2e8dfce5e4a2bd5a03ddbaa1f5f2da59f62460e4ac1a5b7ac26c5ada72ab8b41de0
-
SSDEEP
1536:FDJLeDCOMhWY7essl3CNi+pwGk8FAS0pGzQoTXACzp6WTQhAGA9z6xFt5lvC:N1UYdisslyc+pG8FSX8SW8U9z6Dvl
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5