General
-
Target
13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d
-
Size
120KB
-
Sample
241211-yg1mta1jaj
-
MD5
ea956eb7d76bc974e76aaaadf9676373
-
SHA1
000f3e1a13eaae8ba560865e7777e603ac6fb1c1
-
SHA256
13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d
-
SHA512
ac9127bd88e23ba153ebce2ed3f160f1a53de60c2932302877723746a3f6271bab5acf27a7d11d302abed550aac364da2d165e2aac4915825e18e3e4ec664c27
-
SSDEEP
1536:orK5RBCtk71WMFRQhWktAOIf8Sax4mjjcT41/u2G9mk1/lPr76HHYmCPgMT:oQCtk71+RPIYx4EjOtPr76H4mCPgMT
Static task
static1
Behavioral task
behavioral1
Sample
13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d
-
Size
120KB
-
MD5
ea956eb7d76bc974e76aaaadf9676373
-
SHA1
000f3e1a13eaae8ba560865e7777e603ac6fb1c1
-
SHA256
13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d
-
SHA512
ac9127bd88e23ba153ebce2ed3f160f1a53de60c2932302877723746a3f6271bab5acf27a7d11d302abed550aac364da2d165e2aac4915825e18e3e4ec664c27
-
SSDEEP
1536:orK5RBCtk71WMFRQhWktAOIf8Sax4mjjcT41/u2G9mk1/lPr76HHYmCPgMT:oQCtk71+RPIYx4EjOtPr76H4mCPgMT
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5