General
-
Target
7b717abb437089f985e2e11382f860e36dd51cca77603eded5301df17f4cf860.exe
-
Size
120KB
-
Sample
241231-k1qp3atjes
-
MD5
c519232155d718ca066c822a7c14e109
-
SHA1
48d186d508a53fe199d85e1e7d226615cae2c752
-
SHA256
7b717abb437089f985e2e11382f860e36dd51cca77603eded5301df17f4cf860
-
SHA512
e9b437651914db95bd310deab86ad9464101085102b5230ed0d67e8e115f9af38c884c4ef807a34fbb541f591e8f1ef44a32041758ebcf0f8108e4f81c32545f
-
SSDEEP
3072:nN1OWDIoQhKmIBENMpu4bYgDTuxD3nbsT:nN1O6IowIBEMu4bqxzgT
Static task
static1
Behavioral task
behavioral1
Sample
7b717abb437089f985e2e11382f860e36dd51cca77603eded5301df17f4cf860.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7b717abb437089f985e2e11382f860e36dd51cca77603eded5301df17f4cf860.exe
-
Size
120KB
-
MD5
c519232155d718ca066c822a7c14e109
-
SHA1
48d186d508a53fe199d85e1e7d226615cae2c752
-
SHA256
7b717abb437089f985e2e11382f860e36dd51cca77603eded5301df17f4cf860
-
SHA512
e9b437651914db95bd310deab86ad9464101085102b5230ed0d67e8e115f9af38c884c4ef807a34fbb541f591e8f1ef44a32041758ebcf0f8108e4f81c32545f
-
SSDEEP
3072:nN1OWDIoQhKmIBENMpu4bYgDTuxD3nbsT:nN1O6IowIBEMu4bqxzgT
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5