General
-
Target
50a39e59f30bb67a4f1c8f0951a0f65a42f377d777f0ba271a7b1cf9f6c362e8N.exe
-
Size
120KB
-
Sample
241231-pelanszlay
-
MD5
c67454882d79c0a2f44884f0328429c0
-
SHA1
ac7879f3c4907057fd56e74d0e5a4f289ba8e73e
-
SHA256
50a39e59f30bb67a4f1c8f0951a0f65a42f377d777f0ba271a7b1cf9f6c362e8
-
SHA512
dd22b9a390bd30d92dd1ca856cb5fe55061dd08b1ee040c7bdaf09c0d52aed63045aa79cd28f6ae2edd9eefa1d2c6d4f65156b227be6d35ca750f936ec5ede02
-
SSDEEP
1536:iZL7UXCYF6W/2dKxoog8zOVH62RuwPYeqrmgjSZ7+FVpJjtxD72t1Uz3f4J+JiFX:iMpCKx3dOIwPYygjS4FV/5xD77Uei8s
Static task
static1
Behavioral task
behavioral1
Sample
50a39e59f30bb67a4f1c8f0951a0f65a42f377d777f0ba271a7b1cf9f6c362e8N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
50a39e59f30bb67a4f1c8f0951a0f65a42f377d777f0ba271a7b1cf9f6c362e8N.exe
-
Size
120KB
-
MD5
c67454882d79c0a2f44884f0328429c0
-
SHA1
ac7879f3c4907057fd56e74d0e5a4f289ba8e73e
-
SHA256
50a39e59f30bb67a4f1c8f0951a0f65a42f377d777f0ba271a7b1cf9f6c362e8
-
SHA512
dd22b9a390bd30d92dd1ca856cb5fe55061dd08b1ee040c7bdaf09c0d52aed63045aa79cd28f6ae2edd9eefa1d2c6d4f65156b227be6d35ca750f936ec5ede02
-
SSDEEP
1536:iZL7UXCYF6W/2dKxoog8zOVH62RuwPYeqrmgjSZ7+FVpJjtxD72t1Uz3f4J+JiFX:iMpCKx3dOIwPYygjS4FV/5xD77Uei8s
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5