General
-
Target
43287a2d656db960528ddff2a0accfa42e7f221ebcd608005332054cca3e6b4d.exe
-
Size
120KB
-
Sample
250201-nspdtasmen
-
MD5
5df725214f06e991611c4bae713a6da6
-
SHA1
19a36425c4905181d2abc793c340b53f0d283243
-
SHA256
43287a2d656db960528ddff2a0accfa42e7f221ebcd608005332054cca3e6b4d
-
SHA512
5242096805b686abdbb1bc7d8b1ba650c541dac098611e749953c8054939777de9b12939c4bb71dcbb76d5b0f7bf2aea1e40f40933a2479d891aa3c39ea0f7eb
-
SSDEEP
1536:p3svEzuYfaX3/BAd4rXdHd9NOEbM8CB/p4X5DkHJhrAj5HGsXxd1lPxxR4X5jKb0:46inhXlzNOJpyX54HTG5ms1lPxx6ItG
Static task
static1
Behavioral task
behavioral1
Sample
43287a2d656db960528ddff2a0accfa42e7f221ebcd608005332054cca3e6b4d.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
43287a2d656db960528ddff2a0accfa42e7f221ebcd608005332054cca3e6b4d.exe
-
Size
120KB
-
MD5
5df725214f06e991611c4bae713a6da6
-
SHA1
19a36425c4905181d2abc793c340b53f0d283243
-
SHA256
43287a2d656db960528ddff2a0accfa42e7f221ebcd608005332054cca3e6b4d
-
SHA512
5242096805b686abdbb1bc7d8b1ba650c541dac098611e749953c8054939777de9b12939c4bb71dcbb76d5b0f7bf2aea1e40f40933a2479d891aa3c39ea0f7eb
-
SSDEEP
1536:p3svEzuYfaX3/BAd4rXdHd9NOEbM8CB/p4X5DkHJhrAj5HGsXxd1lPxxR4X5jKb0:46inhXlzNOJpyX54HTG5ms1lPxx6ItG
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5