General
-
Target
fb8e0d7567746e1c729e6c3a6403db775559f21ce53ed35cde03153d77933a28.exe
-
Size
120KB
-
Sample
241207-cg2dfswjfl
-
MD5
4c260adb8920322e2198f0f8cd6005e8
-
SHA1
56bb518ddf24fc4f4bccccde4ad2082f7feb2057
-
SHA256
fb8e0d7567746e1c729e6c3a6403db775559f21ce53ed35cde03153d77933a28
-
SHA512
cc58087368bdd96678703fbe968100a2eba9a238bf49a3905f7d6b91e068fe9ccd7b9744dcc41f33f4e01745af4186a536359708a25f8c07306b911a3a56247b
-
SSDEEP
3072:doVrT5UGhUK8k5wMpA3rlAS5BbR4W1REC5:do159hUK8kxAxnJ4W1WI
Static task
static1
Behavioral task
behavioral1
Sample
fb8e0d7567746e1c729e6c3a6403db775559f21ce53ed35cde03153d77933a28.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fb8e0d7567746e1c729e6c3a6403db775559f21ce53ed35cde03153d77933a28.exe
-
Size
120KB
-
MD5
4c260adb8920322e2198f0f8cd6005e8
-
SHA1
56bb518ddf24fc4f4bccccde4ad2082f7feb2057
-
SHA256
fb8e0d7567746e1c729e6c3a6403db775559f21ce53ed35cde03153d77933a28
-
SHA512
cc58087368bdd96678703fbe968100a2eba9a238bf49a3905f7d6b91e068fe9ccd7b9744dcc41f33f4e01745af4186a536359708a25f8c07306b911a3a56247b
-
SSDEEP
3072:doVrT5UGhUK8k5wMpA3rlAS5BbR4W1REC5:do159hUK8kxAxnJ4W1WI
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5