General
-
Target
00b755e6e66c2c7dbdcee0d14518cf614dcd02bfaf0cc21d8cd9bfddd0de1bf3
-
Size
120KB
-
Sample
241208-xsvp9sslez
-
MD5
5814aa3ebf221fae8f3eef553c00f15b
-
SHA1
da6f41ab6e2e0d2adfc778b507e2b0d8fa49113f
-
SHA256
00b755e6e66c2c7dbdcee0d14518cf614dcd02bfaf0cc21d8cd9bfddd0de1bf3
-
SHA512
ae478a6c54bc21a94cccf9b31e222a6cefe3cbb00bbdf17b84849293eaff654f71b228db2e8b3b1daa909b69728ffc649bdd7284819a77ff9aff6503e9a04848
-
SSDEEP
1536:Cs1zxpZBETikZ80HwlxQgJIIdVVa5uwfQeB5Q75ze3SPoHLwG5K9tPwHK:bPZBET5pHO78uaXQo3SwN
Static task
static1
Behavioral task
behavioral1
Sample
00b755e6e66c2c7dbdcee0d14518cf614dcd02bfaf0cc21d8cd9bfddd0de1bf3.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
00b755e6e66c2c7dbdcee0d14518cf614dcd02bfaf0cc21d8cd9bfddd0de1bf3
-
Size
120KB
-
MD5
5814aa3ebf221fae8f3eef553c00f15b
-
SHA1
da6f41ab6e2e0d2adfc778b507e2b0d8fa49113f
-
SHA256
00b755e6e66c2c7dbdcee0d14518cf614dcd02bfaf0cc21d8cd9bfddd0de1bf3
-
SHA512
ae478a6c54bc21a94cccf9b31e222a6cefe3cbb00bbdf17b84849293eaff654f71b228db2e8b3b1daa909b69728ffc649bdd7284819a77ff9aff6503e9a04848
-
SSDEEP
1536:Cs1zxpZBETikZ80HwlxQgJIIdVVa5uwfQeB5Q75ze3SPoHLwG5K9tPwHK:bPZBET5pHO78uaXQo3SwN
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5