General
-
Target
d09f9a77358ae48847187f7480a1491bf21da860d0426caa38e5481a86286c9eN.exe
-
Size
120KB
-
Sample
241231-xpql5stqgy
-
MD5
8e3c24b6764a6d39ba21ed6994de1d30
-
SHA1
2ec15db0cc8799160eabceb4a12b8da246357deb
-
SHA256
d09f9a77358ae48847187f7480a1491bf21da860d0426caa38e5481a86286c9e
-
SHA512
1fe132146416b83b48562e19bbbcf8b8c3c91ec788b4b01020725b8a348d76cc8a696e1630d3bed82d4859a8cd1e89527b68db2cf88a78fbf99149a423f3373e
-
SSDEEP
1536:Kf/Wj6Ja0xSdsrZDlqzm6fudKfTusbKTCkDdkybW7eTUmfkJg7M1Ygd2/eNOove:Kf/WxYZpsmo//bKGkDGQW2pfYygEeDe
Static task
static1
Behavioral task
behavioral1
Sample
d09f9a77358ae48847187f7480a1491bf21da860d0426caa38e5481a86286c9eN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d09f9a77358ae48847187f7480a1491bf21da860d0426caa38e5481a86286c9eN.exe
-
Size
120KB
-
MD5
8e3c24b6764a6d39ba21ed6994de1d30
-
SHA1
2ec15db0cc8799160eabceb4a12b8da246357deb
-
SHA256
d09f9a77358ae48847187f7480a1491bf21da860d0426caa38e5481a86286c9e
-
SHA512
1fe132146416b83b48562e19bbbcf8b8c3c91ec788b4b01020725b8a348d76cc8a696e1630d3bed82d4859a8cd1e89527b68db2cf88a78fbf99149a423f3373e
-
SSDEEP
1536:Kf/Wj6Ja0xSdsrZDlqzm6fudKfTusbKTCkDdkybW7eTUmfkJg7M1Ygd2/eNOove:Kf/WxYZpsmo//bKGkDGQW2pfYygEeDe
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5