General
-
Target
84066ff1a558a6cc5ed0546c0c6efc57d17a7e6c786e807fe5574f1186f6f8ebN.exe
-
Size
120KB
-
Sample
241206-w6k8bawrcm
-
MD5
acb3fff292e1a589757706508b2da4a0
-
SHA1
ba54ff5d6ddf083de779710bf7839cf64f4951d8
-
SHA256
84066ff1a558a6cc5ed0546c0c6efc57d17a7e6c786e807fe5574f1186f6f8eb
-
SHA512
97f6ccd5d27f7cdbe5af3912c1cbc4e7d72d452590d9a7d91625512c8c17be8053a6b6097aa55bb50acf01f2154df5104ad1f6cfabaccb0545889e552b70f5ff
-
SSDEEP
1536:jdTJ570lUjwQLBnoZC4O+lWPxcXTpjkral7drrf4Uuw1T3834BcGV6ei6mpTSX:RjYlUzLyQXkUeXTxKy7pgUuus34Bb4p
Static task
static1
Behavioral task
behavioral1
Sample
84066ff1a558a6cc5ed0546c0c6efc57d17a7e6c786e807fe5574f1186f6f8ebN.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
84066ff1a558a6cc5ed0546c0c6efc57d17a7e6c786e807fe5574f1186f6f8ebN.exe
-
Size
120KB
-
MD5
acb3fff292e1a589757706508b2da4a0
-
SHA1
ba54ff5d6ddf083de779710bf7839cf64f4951d8
-
SHA256
84066ff1a558a6cc5ed0546c0c6efc57d17a7e6c786e807fe5574f1186f6f8eb
-
SHA512
97f6ccd5d27f7cdbe5af3912c1cbc4e7d72d452590d9a7d91625512c8c17be8053a6b6097aa55bb50acf01f2154df5104ad1f6cfabaccb0545889e552b70f5ff
-
SSDEEP
1536:jdTJ570lUjwQLBnoZC4O+lWPxcXTpjkral7drrf4Uuw1T3834BcGV6ei6mpTSX:RjYlUzLyQXkUeXTxKy7pgUuus34Bb4p
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5