General
-
Target
41a3dc3a9dc28174f929c6236470c8f2d311013dadabf9dbd18a4c6015d6fbf3N.exe
-
Size
120KB
-
Sample
241231-w3xryasqft
-
MD5
f49444d08267b1a15bc9cbde19ec2e10
-
SHA1
3f3ad478cf0abeb3caa820dc87ca6b087c7d7845
-
SHA256
41a3dc3a9dc28174f929c6236470c8f2d311013dadabf9dbd18a4c6015d6fbf3
-
SHA512
d39fc923dc06f439dee9414ac082eb32685eab1fd1590696e94121a6de13473b9dc98e8d0eb1e15532ebce83f7ab950153dfe35279cad182566bf7a4a759a488
-
SSDEEP
3072:nN1OWDIoQhKmIBENMpu4bYgDTuxD3nbs:nN1O6IowIBEMu4bqxzg
Static task
static1
Behavioral task
behavioral1
Sample
41a3dc3a9dc28174f929c6236470c8f2d311013dadabf9dbd18a4c6015d6fbf3N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
41a3dc3a9dc28174f929c6236470c8f2d311013dadabf9dbd18a4c6015d6fbf3N.exe
-
Size
120KB
-
MD5
f49444d08267b1a15bc9cbde19ec2e10
-
SHA1
3f3ad478cf0abeb3caa820dc87ca6b087c7d7845
-
SHA256
41a3dc3a9dc28174f929c6236470c8f2d311013dadabf9dbd18a4c6015d6fbf3
-
SHA512
d39fc923dc06f439dee9414ac082eb32685eab1fd1590696e94121a6de13473b9dc98e8d0eb1e15532ebce83f7ab950153dfe35279cad182566bf7a4a759a488
-
SSDEEP
3072:nN1OWDIoQhKmIBENMpu4bYgDTuxD3nbs:nN1O6IowIBEMu4bqxzg
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5