General
-
Target
9d2c705f332d35e796378ca04a38acb52212e95c7368999d266782edc25544a1N.exe
-
Size
120KB
-
Sample
241231-2mf25ssrfx
-
MD5
ed96a00777ea7b337806f11690b228f0
-
SHA1
dd36b431e8aa7371adf011fb56e45bd4dc2a33fa
-
SHA256
9d2c705f332d35e796378ca04a38acb52212e95c7368999d266782edc25544a1
-
SHA512
b11d379b078838ddddb1fdc2a828f3b903e95f32f5856423e7dcfe478c30233dd2263da66c543032f429220f890c58c7354aa14d3fea477880934cd4c1fbeb54
-
SSDEEP
1536:KKwjJ6XzMoKEPJro0tLoNFih7dsfDPV/TOsl/Aw6Pkk3J2iw3V:YjJEzM1ohvCu7ufDPV/TOsljQkky
Static task
static1
Behavioral task
behavioral1
Sample
9d2c705f332d35e796378ca04a38acb52212e95c7368999d266782edc25544a1N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9d2c705f332d35e796378ca04a38acb52212e95c7368999d266782edc25544a1N.exe
-
Size
120KB
-
MD5
ed96a00777ea7b337806f11690b228f0
-
SHA1
dd36b431e8aa7371adf011fb56e45bd4dc2a33fa
-
SHA256
9d2c705f332d35e796378ca04a38acb52212e95c7368999d266782edc25544a1
-
SHA512
b11d379b078838ddddb1fdc2a828f3b903e95f32f5856423e7dcfe478c30233dd2263da66c543032f429220f890c58c7354aa14d3fea477880934cd4c1fbeb54
-
SSDEEP
1536:KKwjJ6XzMoKEPJro0tLoNFih7dsfDPV/TOsl/Aw6Pkk3J2iw3V:YjJEzM1ohvCu7ufDPV/TOsljQkky
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5