General
-
Target
11df08ffae08dd4b727582990fa72ad0033e6fa66dc5ab923ca0449822d1181f
-
Size
120KB
-
Sample
241120-y4pttssbqb
-
MD5
dbf988fdb09d9461465cb075533d9dda
-
SHA1
7562626e045ae542817e3bc97e0b2d438c64fec5
-
SHA256
11df08ffae08dd4b727582990fa72ad0033e6fa66dc5ab923ca0449822d1181f
-
SHA512
1136cb4f0771f6514e220aca7bbd2e8a6f350379599bee25183b9166c475eece15f6017a198c3a6224be921145030e731f6b85074fac1a158d6a9588332e2a49
-
SSDEEP
1536:+LHh/rwCCbYMtENi9HA5xLMLG9quDz4uX29fu2spjjxICyhwI2gRy7mNxlBD:+LlnatE8A7L6G/HX29fxgJIKgRy7mVD
Static task
static1
Behavioral task
behavioral1
Sample
11df08ffae08dd4b727582990fa72ad0033e6fa66dc5ab923ca0449822d1181f.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
11df08ffae08dd4b727582990fa72ad0033e6fa66dc5ab923ca0449822d1181f
-
Size
120KB
-
MD5
dbf988fdb09d9461465cb075533d9dda
-
SHA1
7562626e045ae542817e3bc97e0b2d438c64fec5
-
SHA256
11df08ffae08dd4b727582990fa72ad0033e6fa66dc5ab923ca0449822d1181f
-
SHA512
1136cb4f0771f6514e220aca7bbd2e8a6f350379599bee25183b9166c475eece15f6017a198c3a6224be921145030e731f6b85074fac1a158d6a9588332e2a49
-
SSDEEP
1536:+LHh/rwCCbYMtENi9HA5xLMLG9quDz4uX29fu2spjjxICyhwI2gRy7mNxlBD:+LlnatE8A7L6G/HX29fxgJIKgRy7mVD
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5