General
-
Target
a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34.exe
-
Size
120KB
-
Sample
241206-w3mlza1jes
-
MD5
6dfa885e54ee2857bb9a8b7fc713a986
-
SHA1
cbd51b6202037bc25dc1b9e51363d96b8be3b4ce
-
SHA256
a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34
-
SHA512
6e273eb3f603396f8cc46a4b067b6575ac6754770ec941c653c5591708984d4afbd1c7b384a21ab0f124eee7ded0ccb07092849b4890a70106f44edd4a824d9d
-
SSDEEP
3072:eOsVtD0/PwyPhG75qZCNcQ/b1mfU4J6FsIN:eOkabP05qwiA1mRmsIN
Static task
static1
Behavioral task
behavioral1
Sample
a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34.exe
-
Size
120KB
-
MD5
6dfa885e54ee2857bb9a8b7fc713a986
-
SHA1
cbd51b6202037bc25dc1b9e51363d96b8be3b4ce
-
SHA256
a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34
-
SHA512
6e273eb3f603396f8cc46a4b067b6575ac6754770ec941c653c5591708984d4afbd1c7b384a21ab0f124eee7ded0ccb07092849b4890a70106f44edd4a824d9d
-
SSDEEP
3072:eOsVtD0/PwyPhG75qZCNcQ/b1mfU4J6FsIN:eOkabP05qwiA1mRmsIN
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5