General
-
Target
7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a
-
Size
120KB
-
Sample
241205-271x2stkhp
-
MD5
424423345bbfc88d26b2e8b8b8835f03
-
SHA1
638d7445dee5271246780d248676da0b76b04dd0
-
SHA256
7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a
-
SHA512
d615899a00ea9ce55f00fa214c7351a871503680e165aac1b0530da41744d8f871489b03e98e11afcdc93b2547b63912170d634c06046be2cb21d1cbec1ac8de
-
SSDEEP
1536:pLSgwaoaC+osP30GknDCvThyS4ocqgOkIXNl0fwBY9ZvUTlTmFZaa62FoDVEYcQ2:b8a2sMGknDghySDi0NkLUTleZaatoc
Static task
static1
Behavioral task
behavioral1
Sample
7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a
-
Size
120KB
-
MD5
424423345bbfc88d26b2e8b8b8835f03
-
SHA1
638d7445dee5271246780d248676da0b76b04dd0
-
SHA256
7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a
-
SHA512
d615899a00ea9ce55f00fa214c7351a871503680e165aac1b0530da41744d8f871489b03e98e11afcdc93b2547b63912170d634c06046be2cb21d1cbec1ac8de
-
SSDEEP
1536:pLSgwaoaC+osP30GknDCvThyS4ocqgOkIXNl0fwBY9ZvUTlTmFZaa62FoDVEYcQ2:b8a2sMGknDghySDi0NkLUTleZaatoc
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5