General
-
Target
9519b2fac6183a0e63e67472da8306b574c1c4b79181e1b7a7e09c2ca4f84287
-
Size
120KB
-
Sample
241110-a2lsdsylfk
-
MD5
c882e0a346e56e62fb0e49c023394eb6
-
SHA1
045ae3a79d9c72762919d35ba8f7f3d05e8a66d5
-
SHA256
9519b2fac6183a0e63e67472da8306b574c1c4b79181e1b7a7e09c2ca4f84287
-
SHA512
0e3c69786790fbfdcbaf599be40f69d1963d801c77c732f58a28d7397a31e1926233deb4a0f7db649f91216e548b461c131051a963e1ce18b788fc267c963605
-
SSDEEP
3072:uICxC3Wu7HcM5BbsTh+4wROQ2K30Qy/HE:iUBVceXXwH
Static task
static1
Behavioral task
behavioral1
Sample
9519b2fac6183a0e63e67472da8306b574c1c4b79181e1b7a7e09c2ca4f84287.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9519b2fac6183a0e63e67472da8306b574c1c4b79181e1b7a7e09c2ca4f84287
-
Size
120KB
-
MD5
c882e0a346e56e62fb0e49c023394eb6
-
SHA1
045ae3a79d9c72762919d35ba8f7f3d05e8a66d5
-
SHA256
9519b2fac6183a0e63e67472da8306b574c1c4b79181e1b7a7e09c2ca4f84287
-
SHA512
0e3c69786790fbfdcbaf599be40f69d1963d801c77c732f58a28d7397a31e1926233deb4a0f7db649f91216e548b461c131051a963e1ce18b788fc267c963605
-
SSDEEP
3072:uICxC3Wu7HcM5BbsTh+4wROQ2K30Qy/HE:iUBVceXXwH
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5