General
-
Target
7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e.exe
-
Size
120KB
-
Sample
241231-javewstrex
-
MD5
723c9be16c2df16fb682a02d883fd723
-
SHA1
b95c6d32470c269345ea4dafb7e469f135bb97fd
-
SHA256
7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e
-
SHA512
a2e52ca03e3ff87395e4bb85061bc904cfb502fa5d2fbe23fbc6552d925d98eae352ec17fd20dff64cab251e047685e9e5c7e480cef17d291fe8cd97340e94d0
-
SSDEEP
1536:xzo8bYt+jqCTy0u7rWNBlEIASKyDpTEwKHqwMcgEIyM56ywZC4Eh8L9KGMjnVq:x88bYtsqQaHPSdDqZgEHM56nCN8snRq
Static task
static1
Behavioral task
behavioral1
Sample
7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e.exe
-
Size
120KB
-
MD5
723c9be16c2df16fb682a02d883fd723
-
SHA1
b95c6d32470c269345ea4dafb7e469f135bb97fd
-
SHA256
7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e
-
SHA512
a2e52ca03e3ff87395e4bb85061bc904cfb502fa5d2fbe23fbc6552d925d98eae352ec17fd20dff64cab251e047685e9e5c7e480cef17d291fe8cd97340e94d0
-
SSDEEP
1536:xzo8bYt+jqCTy0u7rWNBlEIASKyDpTEwKHqwMcgEIyM56ywZC4Eh8L9KGMjnVq:x88bYtsqQaHPSdDqZgEHM56nCN8snRq
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5