General
-
Target
77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd.exe
-
Size
120KB
-
Sample
241206-21vgpaymdm
-
MD5
13fafa04737cfb4f268dc263a85bba49
-
SHA1
7512db10f4c93a73ea12d23cd8e9fadb7475644c
-
SHA256
77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd
-
SHA512
7b4cae8790303c72b02ff04b2f140410bed9fe793ef5c54678ab49298d2565cb0a1cff670fbbeebbce09e63e3591c3fd48ad539f085a5d0aee7271243ff8b912
-
SSDEEP
1536:0vL+SuGuUxqQM8qxBGBX5rxxYCKWyz5kcN3+iEZ0ccknByt:9SjMd36JYHz5k63+iMrS
Static task
static1
Behavioral task
behavioral1
Sample
77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd.exe
-
Size
120KB
-
MD5
13fafa04737cfb4f268dc263a85bba49
-
SHA1
7512db10f4c93a73ea12d23cd8e9fadb7475644c
-
SHA256
77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd
-
SHA512
7b4cae8790303c72b02ff04b2f140410bed9fe793ef5c54678ab49298d2565cb0a1cff670fbbeebbce09e63e3591c3fd48ad539f085a5d0aee7271243ff8b912
-
SSDEEP
1536:0vL+SuGuUxqQM8qxBGBX5rxxYCKWyz5kcN3+iEZ0ccknByt:9SjMd36JYHz5k63+iMrS
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5