General
-
Target
d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e.exe
-
Size
120KB
-
Sample
241231-wn94qaskft
-
MD5
1834bcbef9e5ed544c51b09047cdd764
-
SHA1
74fa293179a17105187b90d95d1ccaa59947adca
-
SHA256
d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e
-
SHA512
8c415a6293bcbbd846095cb58f5de4d3cc1add63ec8dbe21680ca81f8beadd42f0ad9e5efea23258b962f3b877e6ce2171a0de49a8464fadb13d178c3adcce28
-
SSDEEP
3072:5qxOMupR5NCza/6rg7imqZDg4fIOdm0zYgM82:tMuv5kVE7iPZDxfG0g82
Static task
static1
Behavioral task
behavioral1
Sample
d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e.exe
-
Size
120KB
-
MD5
1834bcbef9e5ed544c51b09047cdd764
-
SHA1
74fa293179a17105187b90d95d1ccaa59947adca
-
SHA256
d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e
-
SHA512
8c415a6293bcbbd846095cb58f5de4d3cc1add63ec8dbe21680ca81f8beadd42f0ad9e5efea23258b962f3b877e6ce2171a0de49a8464fadb13d178c3adcce28
-
SSDEEP
3072:5qxOMupR5NCza/6rg7imqZDg4fIOdm0zYgM82:tMuv5kVE7iPZDxfG0g82
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5