General
-
Target
33505769ab40185e0892bf5c8b96c01a1ef51bd47fa270556019944903d22834
-
Size
120KB
-
Sample
241215-z6psaaxmgz
-
MD5
63a27f322463a693bdec9657d250a1dc
-
SHA1
d0e9c42ee85cb816369329cf6460a5e31dfa6fd8
-
SHA256
33505769ab40185e0892bf5c8b96c01a1ef51bd47fa270556019944903d22834
-
SHA512
909e6effffc73d871c0a09421a1d7de071950bdcbd0639708f02b13e4f5285f8fe5994d2ac9add625c4b73dd3873627faf6c7deec94a51898646748e30a7e7de
-
SSDEEP
3072:eWtJeK1Sze8VZjBId7QfhfK1em9v2kOb+gU4:e2UKNWZ9/hfij9v2kOb1/
Static task
static1
Behavioral task
behavioral1
Sample
33505769ab40185e0892bf5c8b96c01a1ef51bd47fa270556019944903d22834.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
33505769ab40185e0892bf5c8b96c01a1ef51bd47fa270556019944903d22834
-
Size
120KB
-
MD5
63a27f322463a693bdec9657d250a1dc
-
SHA1
d0e9c42ee85cb816369329cf6460a5e31dfa6fd8
-
SHA256
33505769ab40185e0892bf5c8b96c01a1ef51bd47fa270556019944903d22834
-
SHA512
909e6effffc73d871c0a09421a1d7de071950bdcbd0639708f02b13e4f5285f8fe5994d2ac9add625c4b73dd3873627faf6c7deec94a51898646748e30a7e7de
-
SSDEEP
3072:eWtJeK1Sze8VZjBId7QfhfK1em9v2kOb+gU4:e2UKNWZ9/hfij9v2kOb1/
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5