General
-
Target
6eb0923b633d484a45553c2ca3f13287dd5b0d81e12f5291d6b4f2a5cbb97247N.exe
-
Size
120KB
-
Sample
241215-2v69assqem
-
MD5
85fdf4527f7724b32b5e83688a74d300
-
SHA1
42d9a3d3e2704185f2fbfac2c19914b88841b931
-
SHA256
6eb0923b633d484a45553c2ca3f13287dd5b0d81e12f5291d6b4f2a5cbb97247
-
SHA512
b36b28835751f6dc25a96d1506c75d3d4a332789e76c6aad395f9314ffaef04f30f4ada75f979c31e715b9c57c52e71f957e506dbc79cf719dea9c80089534fd
-
SSDEEP
1536:CuYTeVUU5qIhSBNt8xXyVxw6aGM+XTyNEDNTbiJ/oErnfJBNj/8JW6RoLeJR:CuuAHINaNyVm6g+Xo+VbiloErnBT6iY
Static task
static1
Behavioral task
behavioral1
Sample
6eb0923b633d484a45553c2ca3f13287dd5b0d81e12f5291d6b4f2a5cbb97247N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6eb0923b633d484a45553c2ca3f13287dd5b0d81e12f5291d6b4f2a5cbb97247N.exe
-
Size
120KB
-
MD5
85fdf4527f7724b32b5e83688a74d300
-
SHA1
42d9a3d3e2704185f2fbfac2c19914b88841b931
-
SHA256
6eb0923b633d484a45553c2ca3f13287dd5b0d81e12f5291d6b4f2a5cbb97247
-
SHA512
b36b28835751f6dc25a96d1506c75d3d4a332789e76c6aad395f9314ffaef04f30f4ada75f979c31e715b9c57c52e71f957e506dbc79cf719dea9c80089534fd
-
SSDEEP
1536:CuYTeVUU5qIhSBNt8xXyVxw6aGM+XTyNEDNTbiJ/oErnfJBNj/8JW6RoLeJR:CuuAHINaNyVm6g+Xo+VbiloErnBT6iY
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5