General
-
Target
ab0c0baf9b0b45b67a3113b62d7217d8c969dfec3a8faa0d83865326f418f6cf
-
Size
120KB
-
Sample
241208-cc1alawldw
-
MD5
8e2f0e721406fbfb38fa6892bf772ecd
-
SHA1
d46fb4240949a0e233f3809feb93f83379df824b
-
SHA256
ab0c0baf9b0b45b67a3113b62d7217d8c969dfec3a8faa0d83865326f418f6cf
-
SHA512
9086b64150f3859c25135a02ac200b89c02015409d8371a1a3ca743ff3d8fd1ca9d20d8a7d20a65463ca5a0aaa64d527104a027cbbda8aa7877875e708186225
-
SSDEEP
1536:/YjeaSvrRS/iCsFfFUbUp4KuPR6DDHUDFJqE6XAtDrj5A25tcSdggXr:wjeaqYrQGDeDWzqExtDKCPegXr
Static task
static1
Behavioral task
behavioral1
Sample
ab0c0baf9b0b45b67a3113b62d7217d8c969dfec3a8faa0d83865326f418f6cf.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ab0c0baf9b0b45b67a3113b62d7217d8c969dfec3a8faa0d83865326f418f6cf
-
Size
120KB
-
MD5
8e2f0e721406fbfb38fa6892bf772ecd
-
SHA1
d46fb4240949a0e233f3809feb93f83379df824b
-
SHA256
ab0c0baf9b0b45b67a3113b62d7217d8c969dfec3a8faa0d83865326f418f6cf
-
SHA512
9086b64150f3859c25135a02ac200b89c02015409d8371a1a3ca743ff3d8fd1ca9d20d8a7d20a65463ca5a0aaa64d527104a027cbbda8aa7877875e708186225
-
SSDEEP
1536:/YjeaSvrRS/iCsFfFUbUp4KuPR6DDHUDFJqE6XAtDrj5A25tcSdggXr:wjeaqYrQGDeDWzqExtDKCPegXr
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5