General
-
Target
293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1
-
Size
120KB
-
Sample
241207-zpk3rssrey
-
MD5
1aee3e588c26fcd8c7bf630aafd574ef
-
SHA1
94f3aa5eb3031fc66c790dea7e05f839a570f65e
-
SHA256
293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1
-
SHA512
af2fbc9655cdb975f1362af2d34960c23711fee09cf2f8d16b6edccb368baaa43d13309d87c523a641f842266934226e00b8269ab154bf2cf68f7a63f1d5c39c
-
SSDEEP
3072:AsN1r8sAwk4yPUwUQMeXNV2CzxXIrRLXLRY:AsY7PUwUQLzV6RPRY
Static task
static1
Behavioral task
behavioral1
Sample
293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1
-
Size
120KB
-
MD5
1aee3e588c26fcd8c7bf630aafd574ef
-
SHA1
94f3aa5eb3031fc66c790dea7e05f839a570f65e
-
SHA256
293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1
-
SHA512
af2fbc9655cdb975f1362af2d34960c23711fee09cf2f8d16b6edccb368baaa43d13309d87c523a641f842266934226e00b8269ab154bf2cf68f7a63f1d5c39c
-
SSDEEP
3072:AsN1r8sAwk4yPUwUQMeXNV2CzxXIrRLXLRY:AsY7PUwUQLzV6RPRY
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5