General
-
Target
fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19N.exe
-
Size
120KB
-
Sample
241204-kbzxfavlcl
-
MD5
9e6ff82e8d1554d37a11d4958df46150
-
SHA1
de9bb3b54eea694101bc0d642a191d847587dc2c
-
SHA256
fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19
-
SHA512
2275b3ff0f241f217f4adba4d88890cfdcceb2f24d9c02cfc95f5db602898cb5013d288e37935fb9c6d02f6725f59aae39f003b542840febe1a3687eb9002a01
-
SSDEEP
3072:aaniXamvKL/u3We1Wzc86ASw4b9am/yJWHb:aaiXhiE8Xlsb
Static task
static1
Behavioral task
behavioral1
Sample
fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19N.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19N.exe
-
Size
120KB
-
MD5
9e6ff82e8d1554d37a11d4958df46150
-
SHA1
de9bb3b54eea694101bc0d642a191d847587dc2c
-
SHA256
fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19
-
SHA512
2275b3ff0f241f217f4adba4d88890cfdcceb2f24d9c02cfc95f5db602898cb5013d288e37935fb9c6d02f6725f59aae39f003b542840febe1a3687eb9002a01
-
SSDEEP
3072:aaniXamvKL/u3We1Wzc86ASw4b9am/yJWHb:aaiXhiE8Xlsb
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5