General
-
Target
6f77e34ff80d41b1e0b3be005989ffc113050b7cc4278540cf630b9012b50b42.exe
-
Size
120KB
-
Sample
241211-mjr8nsynax
-
MD5
a53b8807a2100eb7d2534138d3a4b61b
-
SHA1
fe75888d30ba62225436d7eb256a672d705e7547
-
SHA256
6f77e34ff80d41b1e0b3be005989ffc113050b7cc4278540cf630b9012b50b42
-
SHA512
e8bde7baecef7625839f063f0b294c95b444bf71902c5651d4827bb73a8328d1006d2cdf28739a82132c03d2c7b4f874ece99dd9924c24d9a633d5a496e545a5
-
SSDEEP
3072:a/SQpWL/vAkKqtn7a+UEyXRLG+ZjMKFiFqaz7vynd:a/bWLnAkKqB++UEoR6D72
Static task
static1
Behavioral task
behavioral1
Sample
6f77e34ff80d41b1e0b3be005989ffc113050b7cc4278540cf630b9012b50b42.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6f77e34ff80d41b1e0b3be005989ffc113050b7cc4278540cf630b9012b50b42.exe
-
Size
120KB
-
MD5
a53b8807a2100eb7d2534138d3a4b61b
-
SHA1
fe75888d30ba62225436d7eb256a672d705e7547
-
SHA256
6f77e34ff80d41b1e0b3be005989ffc113050b7cc4278540cf630b9012b50b42
-
SHA512
e8bde7baecef7625839f063f0b294c95b444bf71902c5651d4827bb73a8328d1006d2cdf28739a82132c03d2c7b4f874ece99dd9924c24d9a633d5a496e545a5
-
SSDEEP
3072:a/SQpWL/vAkKqtn7a+UEyXRLG+ZjMKFiFqaz7vynd:a/bWLnAkKqB++UEoR6D72
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5