General
-
Target
bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be.exe
-
Size
120KB
-
Sample
241216-16282s1qez
-
MD5
eba23d1639ce02c3aa35366db3df053f
-
SHA1
5f600a8b7244d9f76589b90e2158034a2abebe2e
-
SHA256
bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be
-
SHA512
5527b4cb41c64b2ccb730a6bd3cb66007d50b134b18fb6c77c4869d09503c050df8816f1de79d8c770d40fd844b0579d94dfe83016fff9a4301fa9ca2268022a
-
SSDEEP
3072:eewJuzPRfTMRMncuSjhsA0DkeD2XdL1P6J64O:e1JujBIRMnJmOKe+VQO
Static task
static1
Behavioral task
behavioral1
Sample
bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be.exe
-
Size
120KB
-
MD5
eba23d1639ce02c3aa35366db3df053f
-
SHA1
5f600a8b7244d9f76589b90e2158034a2abebe2e
-
SHA256
bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be
-
SHA512
5527b4cb41c64b2ccb730a6bd3cb66007d50b134b18fb6c77c4869d09503c050df8816f1de79d8c770d40fd844b0579d94dfe83016fff9a4301fa9ca2268022a
-
SSDEEP
3072:eewJuzPRfTMRMncuSjhsA0DkeD2XdL1P6J64O:e1JujBIRMnJmOKe+VQO
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5