General
-
Target
6b4bcc5db6714bdfb28a06fa41ab262227ed3186daf60cd5984fd1b93bf69ce0.exe
-
Size
120KB
-
Sample
241211-qfpj6aykdj
-
MD5
e3f1c306d339483420499dfb38d6eb53
-
SHA1
f0e26be09a0fd80fc417c4d710f50b6749e0e300
-
SHA256
6b4bcc5db6714bdfb28a06fa41ab262227ed3186daf60cd5984fd1b93bf69ce0
-
SHA512
7c4fda6f92d0d73cca0fd356a330f50c2ea85425cb4554cb73df71efc949eb0aead639c488fd94b36ff37a514fb6ea55ec5533163557dd7aef4f8f58c7b32e23
-
SSDEEP
3072:DBfxRBG91cdIjeTA05D8+vTVLe9uXnvmF+SPR:lj8fOiekUNNe9aq+SPR
Static task
static1
Behavioral task
behavioral1
Sample
6b4bcc5db6714bdfb28a06fa41ab262227ed3186daf60cd5984fd1b93bf69ce0.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6b4bcc5db6714bdfb28a06fa41ab262227ed3186daf60cd5984fd1b93bf69ce0.exe
-
Size
120KB
-
MD5
e3f1c306d339483420499dfb38d6eb53
-
SHA1
f0e26be09a0fd80fc417c4d710f50b6749e0e300
-
SHA256
6b4bcc5db6714bdfb28a06fa41ab262227ed3186daf60cd5984fd1b93bf69ce0
-
SHA512
7c4fda6f92d0d73cca0fd356a330f50c2ea85425cb4554cb73df71efc949eb0aead639c488fd94b36ff37a514fb6ea55ec5533163557dd7aef4f8f58c7b32e23
-
SSDEEP
3072:DBfxRBG91cdIjeTA05D8+vTVLe9uXnvmF+SPR:lj8fOiekUNNe9aq+SPR
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5