General
-
Target
f7e7103105160f61d4f393cd3d1a5d185d736444e1497ecd218d2dbabe60e78aN.exe
-
Size
120KB
-
Sample
241230-r2n17aznfv
-
MD5
8e10d060e00c1949d2c3446bb1de1fa0
-
SHA1
621c756713196264fe794e4c18ec8876d81b9bb8
-
SHA256
f7e7103105160f61d4f393cd3d1a5d185d736444e1497ecd218d2dbabe60e78a
-
SHA512
b307018457b65d81793eda83e98edd91804011151bc0c7775cdd709406b0f5611bf6448f12541c31967b026ee324bc118bd9db1309211260490f946b067be578
-
SSDEEP
3072:vP41hbB4djmnVP6yPSkKLnctimeGTpR9nX+:ihbWIV1KzcUmeGTpPu
Static task
static1
Behavioral task
behavioral1
Sample
f7e7103105160f61d4f393cd3d1a5d185d736444e1497ecd218d2dbabe60e78aN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f7e7103105160f61d4f393cd3d1a5d185d736444e1497ecd218d2dbabe60e78aN.exe
-
Size
120KB
-
MD5
8e10d060e00c1949d2c3446bb1de1fa0
-
SHA1
621c756713196264fe794e4c18ec8876d81b9bb8
-
SHA256
f7e7103105160f61d4f393cd3d1a5d185d736444e1497ecd218d2dbabe60e78a
-
SHA512
b307018457b65d81793eda83e98edd91804011151bc0c7775cdd709406b0f5611bf6448f12541c31967b026ee324bc118bd9db1309211260490f946b067be578
-
SSDEEP
3072:vP41hbB4djmnVP6yPSkKLnctimeGTpR9nX+:ihbWIV1KzcUmeGTpPu
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5