General
-
Target
50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71.exe
-
Size
120KB
-
Sample
241231-smrn7swmdy
-
MD5
464ee14a56717a4abfe059ce9796dd52
-
SHA1
79a38da1c205ad0b2a359e82cd90b2930f5004be
-
SHA256
50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71
-
SHA512
cfd5c44934f41b6f3f449957c33eec032d5e5d95de55d239feef261176b2ad25dfadf9b4a50b9f1332317848ba28254f6fa607e8ad2e857cdad21fe46cb423e2
-
SSDEEP
3072:U39Gtlvc5dTdenw8R3iPoeeOi97lsDgbOzw6el:Qulvc5mF4rHriX6el
Static task
static1
Behavioral task
behavioral1
Sample
50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71.exe
-
Size
120KB
-
MD5
464ee14a56717a4abfe059ce9796dd52
-
SHA1
79a38da1c205ad0b2a359e82cd90b2930f5004be
-
SHA256
50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71
-
SHA512
cfd5c44934f41b6f3f449957c33eec032d5e5d95de55d239feef261176b2ad25dfadf9b4a50b9f1332317848ba28254f6fa607e8ad2e857cdad21fe46cb423e2
-
SSDEEP
3072:U39Gtlvc5dTdenw8R3iPoeeOi97lsDgbOzw6el:Qulvc5mF4rHriX6el
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5