General
-
Target
c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab
-
Size
120KB
-
Sample
241120-dx89nszbjb
-
MD5
d2317622a66a297eecc5cc8f0b45952a
-
SHA1
93e7f7988619500be5ca9a9c7cc06d124e0df36e
-
SHA256
c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab
-
SHA512
270acefb1a6a300c57e1461e0cd55171eeb9ca6040bf580c8a6bef3a70de17274a11ee49cdc10ee57d54c782c9cc0938f197e10bea0322f9c9c7e81c051178c0
-
SSDEEP
3072:9ZhYg1nTTgv0Vi5QESGZZJ0G47fOFeUArcpV5:9r60oTSs0R7f25AS
Static task
static1
Behavioral task
behavioral1
Sample
c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab
-
Size
120KB
-
MD5
d2317622a66a297eecc5cc8f0b45952a
-
SHA1
93e7f7988619500be5ca9a9c7cc06d124e0df36e
-
SHA256
c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab
-
SHA512
270acefb1a6a300c57e1461e0cd55171eeb9ca6040bf580c8a6bef3a70de17274a11ee49cdc10ee57d54c782c9cc0938f197e10bea0322f9c9c7e81c051178c0
-
SSDEEP
3072:9ZhYg1nTTgv0Vi5QESGZZJ0G47fOFeUArcpV5:9r60oTSs0R7f25AS
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5