General
-
Target
296262f4673d016f99bd7c126b7934b37469dd275b6dd44805356e081d2ebb74
-
Size
120KB
-
Sample
241121-zjk6ksxmhs
-
MD5
64aab437ce8b596ab03d4f8ba65419c2
-
SHA1
7da8f20c4b9492d934232a8b424b70d9311b058f
-
SHA256
296262f4673d016f99bd7c126b7934b37469dd275b6dd44805356e081d2ebb74
-
SHA512
2b7d4284090f85b592dd5274bf7cb825c5d73891f294709ec645afe1460d87dfbc6f6f065280a2aaf2c56763723a247e5fc196eb41ac3e0b845534a031dc7167
-
SSDEEP
1536:Kx+CPdV5tOvMqUIJzU3KGo79PJD0sVKkaqEBb4Z+aVWEObNFky7Z/PmR8tNIAGJ:MVnOfUIJ4olJD0sR4B5a0EqFk4cSJi
Static task
static1
Behavioral task
behavioral1
Sample
296262f4673d016f99bd7c126b7934b37469dd275b6dd44805356e081d2ebb74.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
296262f4673d016f99bd7c126b7934b37469dd275b6dd44805356e081d2ebb74
-
Size
120KB
-
MD5
64aab437ce8b596ab03d4f8ba65419c2
-
SHA1
7da8f20c4b9492d934232a8b424b70d9311b058f
-
SHA256
296262f4673d016f99bd7c126b7934b37469dd275b6dd44805356e081d2ebb74
-
SHA512
2b7d4284090f85b592dd5274bf7cb825c5d73891f294709ec645afe1460d87dfbc6f6f065280a2aaf2c56763723a247e5fc196eb41ac3e0b845534a031dc7167
-
SSDEEP
1536:Kx+CPdV5tOvMqUIJzU3KGo79PJD0sVKkaqEBb4Z+aVWEObNFky7Z/PmR8tNIAGJ:MVnOfUIJ4olJD0sR4B5a0EqFk4cSJi
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5