General
-
Target
7cbb7498a48b5237bac4c8137a40ad39856c5f7022b587e2fa6c31fbc0f6cd0b.exe
-
Size
120KB
-
Sample
241206-pr49baxnby
-
MD5
754cd1d3aa8849bd72719261d857b535
-
SHA1
6c486434935fbb7bab216064b9f867197dc33c67
-
SHA256
7cbb7498a48b5237bac4c8137a40ad39856c5f7022b587e2fa6c31fbc0f6cd0b
-
SHA512
5e9634c179399e6adc89b054f90257f459d12807ae4138ac4327ead1f6bb584af4c0c5b748a390350a152dcbf274f95cfef92bae3256fc64152a075ffa137e11
-
SSDEEP
1536:vW2wPjsCFOLbhvcIqXvtQYCkK7i+NYgZbJTL+50Y4DY3lgf5JVqROB:vBwbsMOLbhvFKveYCkKeGb1H/D
Static task
static1
Behavioral task
behavioral1
Sample
7cbb7498a48b5237bac4c8137a40ad39856c5f7022b587e2fa6c31fbc0f6cd0b.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7cbb7498a48b5237bac4c8137a40ad39856c5f7022b587e2fa6c31fbc0f6cd0b.exe
-
Size
120KB
-
MD5
754cd1d3aa8849bd72719261d857b535
-
SHA1
6c486434935fbb7bab216064b9f867197dc33c67
-
SHA256
7cbb7498a48b5237bac4c8137a40ad39856c5f7022b587e2fa6c31fbc0f6cd0b
-
SHA512
5e9634c179399e6adc89b054f90257f459d12807ae4138ac4327ead1f6bb584af4c0c5b748a390350a152dcbf274f95cfef92bae3256fc64152a075ffa137e11
-
SSDEEP
1536:vW2wPjsCFOLbhvcIqXvtQYCkK7i+NYgZbJTL+50Y4DY3lgf5JVqROB:vBwbsMOLbhvFKveYCkKeGb1H/D
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5