General
-
Target
5e9ceb2255d6790ef89581932b81c685f439f2863f4e7301fd48421636e20537
-
Size
120KB
-
Sample
241229-28jp6azmhs
-
MD5
f9b69a5cc8a91828a1b74cd743f78f89
-
SHA1
6dd2c08c2dc836abced1818ac69cfb7a6d5d1913
-
SHA256
5e9ceb2255d6790ef89581932b81c685f439f2863f4e7301fd48421636e20537
-
SHA512
84e27fe0e8a43249b575e9ab3c166db71f52721a1dfc4abbf5db54119bea661037746c31f68820485cd8768419bfb1280575f351ffc9d8ba5456a6c67235da72
-
SSDEEP
1536:3m/4T39wRk2A7W88MI3JPCbJPXgGvunM5EMNzS0j9Yzehbjn67MclM5:324mRFfFlCbKK5EMNzS0jvj67u
Static task
static1
Behavioral task
behavioral1
Sample
5e9ceb2255d6790ef89581932b81c685f439f2863f4e7301fd48421636e20537.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5e9ceb2255d6790ef89581932b81c685f439f2863f4e7301fd48421636e20537
-
Size
120KB
-
MD5
f9b69a5cc8a91828a1b74cd743f78f89
-
SHA1
6dd2c08c2dc836abced1818ac69cfb7a6d5d1913
-
SHA256
5e9ceb2255d6790ef89581932b81c685f439f2863f4e7301fd48421636e20537
-
SHA512
84e27fe0e8a43249b575e9ab3c166db71f52721a1dfc4abbf5db54119bea661037746c31f68820485cd8768419bfb1280575f351ffc9d8ba5456a6c67235da72
-
SSDEEP
1536:3m/4T39wRk2A7W88MI3JPCbJPXgGvunM5EMNzS0j9Yzehbjn67MclM5:324mRFfFlCbKK5EMNzS0jvj67u
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5