General
-
Target
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.exe
-
Size
120KB
-
Sample
241231-rtj29svjfv
-
MD5
e6865723ddb66b3526e8f5f882408800
-
SHA1
c9edb8b59fd2586523e1ad74d6c67d8547e2421e
-
SHA256
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfa
-
SHA512
a86021be4c79bb4094f12ab3e6350a83d30840f2564b360e95326b538bb5ed072c5d77e3256990cbd6c9b83944c1a5e9eaab732e85101f81d78eafd69705c059
-
SSDEEP
3072:spQG4mKVGceRPNoc3Omks+1c0yM6KKsC4aMayz+LRp:eV4zBe8c3ysOyM6sC4aMayaLj
Static task
static1
Behavioral task
behavioral1
Sample
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfaN.exe
-
Size
120KB
-
MD5
e6865723ddb66b3526e8f5f882408800
-
SHA1
c9edb8b59fd2586523e1ad74d6c67d8547e2421e
-
SHA256
95059c3a41b69fe5e1e9541f9154077f8a6970e92fcd95b538ba750b26e9ecfa
-
SHA512
a86021be4c79bb4094f12ab3e6350a83d30840f2564b360e95326b538bb5ed072c5d77e3256990cbd6c9b83944c1a5e9eaab732e85101f81d78eafd69705c059
-
SSDEEP
3072:spQG4mKVGceRPNoc3Omks+1c0yM6KKsC4aMayz+LRp:eV4zBe8c3ysOyM6sC4aMayaLj
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5