General
-
Target
951a02004cf158fe43ed80aeef23e92f1b0620e0bc248c61d338e2e3d038b126.exe
-
Size
120KB
-
Sample
241231-w9x2aawjhq
-
MD5
37355c41a14796e0233cd61c5a33cd86
-
SHA1
3840aec1acfa8708ba2bf3b990a76dd73ab96eb9
-
SHA256
951a02004cf158fe43ed80aeef23e92f1b0620e0bc248c61d338e2e3d038b126
-
SHA512
f01625a1a3484a6e798b0e60d632deea474e2f9fa6863b3bc6919927eccd342534363abaef13a98df5973e29485c99e8952b782f5fac26797d93d1a03541d558
-
SSDEEP
1536:b0Msl5iQsw4wRMb+hrOt1QcZoeq5D/VUHG9Y7hV1dc/7MSnIj0sE47D0:Psl54bwRMbgrJcZoeqxNUHGAcDM/Rjc
Static task
static1
Behavioral task
behavioral1
Sample
951a02004cf158fe43ed80aeef23e92f1b0620e0bc248c61d338e2e3d038b126.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
951a02004cf158fe43ed80aeef23e92f1b0620e0bc248c61d338e2e3d038b126.exe
-
Size
120KB
-
MD5
37355c41a14796e0233cd61c5a33cd86
-
SHA1
3840aec1acfa8708ba2bf3b990a76dd73ab96eb9
-
SHA256
951a02004cf158fe43ed80aeef23e92f1b0620e0bc248c61d338e2e3d038b126
-
SHA512
f01625a1a3484a6e798b0e60d632deea474e2f9fa6863b3bc6919927eccd342534363abaef13a98df5973e29485c99e8952b782f5fac26797d93d1a03541d558
-
SSDEEP
1536:b0Msl5iQsw4wRMb+hrOt1QcZoeq5D/VUHG9Y7hV1dc/7MSnIj0sE47D0:Psl54bwRMbgrJcZoeqxNUHGAcDM/Rjc
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5