General
-
Target
8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9aN.exe
-
Size
120KB
-
Sample
241230-vgn28szpdm
-
MD5
481003003903f4847cf68640eefb9af0
-
SHA1
f1fa71b857aadef84cda592d75ad719e34b355d3
-
SHA256
8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9a
-
SHA512
13066331883d1a83a14c69941c82fb8199c3774632728549f2add92bfad9d86590905f3cf4698c5a8bbfd8d9330189b026ce8aab7fa2a2033d604584029d4595
-
SSDEEP
3072:IhnMttJyxvM2+7Haak5XpaTcs423ox3ppB:IWfJyxvML7HwHkcA3MB
Static task
static1
Behavioral task
behavioral1
Sample
8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9aN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9aN.exe
-
Size
120KB
-
MD5
481003003903f4847cf68640eefb9af0
-
SHA1
f1fa71b857aadef84cda592d75ad719e34b355d3
-
SHA256
8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9a
-
SHA512
13066331883d1a83a14c69941c82fb8199c3774632728549f2add92bfad9d86590905f3cf4698c5a8bbfd8d9330189b026ce8aab7fa2a2033d604584029d4595
-
SSDEEP
3072:IhnMttJyxvM2+7Haak5XpaTcs423ox3ppB:IWfJyxvML7HwHkcA3MB
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5