General
-
Target
b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3
-
Size
120KB
-
Sample
241122-d3tq6stndv
-
MD5
17a7f90783d0daf14c13ae60fb8eb4d2
-
SHA1
eeb23fb2ce8244a9776a75fea36d9443dfd920ad
-
SHA256
b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3
-
SHA512
c775bad72a865036e1b7651c840e9ec06f0365afddff3ada3690b515c4216e089189c51b9133634b911dc447050dae5945078a2c4a58b82439924a4e2cda4aa8
-
SSDEEP
3072:Tba6Zh1HAvGM38/GRgRRxqmNjqWiRryUq:3vZUeM3NabNDiRe
Static task
static1
Behavioral task
behavioral1
Sample
b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3
-
Size
120KB
-
MD5
17a7f90783d0daf14c13ae60fb8eb4d2
-
SHA1
eeb23fb2ce8244a9776a75fea36d9443dfd920ad
-
SHA256
b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3
-
SHA512
c775bad72a865036e1b7651c840e9ec06f0365afddff3ada3690b515c4216e089189c51b9133634b911dc447050dae5945078a2c4a58b82439924a4e2cda4aa8
-
SSDEEP
3072:Tba6Zh1HAvGM38/GRgRRxqmNjqWiRryUq:3vZUeM3NabNDiRe
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5