General
-
Target
d164a37e6a08b714dba7897316568b31325f1557bc03a95b2d221aa07ca9fa81
-
Size
120KB
-
Sample
241122-e1m2aazpgr
-
MD5
1592d3cbb68047b03506274845c6a354
-
SHA1
fe83c032ff73284a1d414f532c42ba2511d3db12
-
SHA256
d164a37e6a08b714dba7897316568b31325f1557bc03a95b2d221aa07ca9fa81
-
SHA512
463fd14c22b6554587e7486d263079c03b3d2e54fe3fb18bfccd420181354d2186d9485931c2b408d87f36122d916f25dd83901805b0635885a87c95c87fe36a
-
SSDEEP
1536:umUeqFaq2SUYAKpH/Qs4tGaynHt/cuGBvBel/JsQWtBSaGPA6GB5DXpfLKjG3Ld:umUebU1AKp14tfynNEn9K/3eSaGPANd
Static task
static1
Behavioral task
behavioral1
Sample
d164a37e6a08b714dba7897316568b31325f1557bc03a95b2d221aa07ca9fa81.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d164a37e6a08b714dba7897316568b31325f1557bc03a95b2d221aa07ca9fa81
-
Size
120KB
-
MD5
1592d3cbb68047b03506274845c6a354
-
SHA1
fe83c032ff73284a1d414f532c42ba2511d3db12
-
SHA256
d164a37e6a08b714dba7897316568b31325f1557bc03a95b2d221aa07ca9fa81
-
SHA512
463fd14c22b6554587e7486d263079c03b3d2e54fe3fb18bfccd420181354d2186d9485931c2b408d87f36122d916f25dd83901805b0635885a87c95c87fe36a
-
SSDEEP
1536:umUeqFaq2SUYAKpH/Qs4tGaynHt/cuGBvBel/JsQWtBSaGPA6GB5DXpfLKjG3Ld:umUebU1AKp14tfynNEn9K/3eSaGPANd
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5