General
-
Target
f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50
-
Size
2.5MB
-
Sample
241206-eq8j8svpfk
-
MD5
3fe35986acefc2919cac43e24c2aebd0
-
SHA1
c6dbde77283308e8f0601fc95bf0f5c452e13b9e
-
SHA256
f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50
-
SHA512
54a55cf7f8ec16b3605499201e73adb92ed809fd549f599ccd8799a386cedb3b8f8d40523e09b0875a802539b0410684cd99daa37a2fecffc96fa2f309499282
-
SSDEEP
49152:7KiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTBqJ:UrZ23AbsK6Ro022JjL2WEiVqJZB2
Static task
static1
Behavioral task
behavioral1
Sample
f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50
-
Size
2.5MB
-
MD5
3fe35986acefc2919cac43e24c2aebd0
-
SHA1
c6dbde77283308e8f0601fc95bf0f5c452e13b9e
-
SHA256
f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50
-
SHA512
54a55cf7f8ec16b3605499201e73adb92ed809fd549f599ccd8799a386cedb3b8f8d40523e09b0875a802539b0410684cd99daa37a2fecffc96fa2f309499282
-
SSDEEP
49152:7KiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTBqJ:UrZ23AbsK6Ro022JjL2WEiVqJZB2
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5