General
-
Target
885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b.exe
-
Size
120KB
-
Sample
241231-hpk94azldl
-
MD5
a17e403f4d41f01c3f3ec9825a5673d5
-
SHA1
622ddb0ed42a35968b9abc3c867c59eceaaefa47
-
SHA256
885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b
-
SHA512
42a6e96ec10a84a7ba841b575a4b5103cc1e7dc4f051ee8061b54ac9eca266d007d8f8878186be6865bc07082836134574e36702c20d62073da7a641ff890949
-
SSDEEP
1536:XUXZkf5smZJWRc/5gFqxxRTVEPViATRQMtbuNQIgaNVWgxmXPAXpwCNS6CnR:Epkf5KhsxxRJE9RQ5G3qx3nre
Static task
static1
Behavioral task
behavioral1
Sample
885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b.exe
-
Size
120KB
-
MD5
a17e403f4d41f01c3f3ec9825a5673d5
-
SHA1
622ddb0ed42a35968b9abc3c867c59eceaaefa47
-
SHA256
885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b
-
SHA512
42a6e96ec10a84a7ba841b575a4b5103cc1e7dc4f051ee8061b54ac9eca266d007d8f8878186be6865bc07082836134574e36702c20d62073da7a641ff890949
-
SSDEEP
1536:XUXZkf5smZJWRc/5gFqxxRTVEPViATRQMtbuNQIgaNVWgxmXPAXpwCNS6CnR:Epkf5KhsxxRJE9RQ5G3qx3nre
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5