General
-
Target
8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe
-
Size
120KB
-
Sample
241216-apdagswmgn
-
MD5
e556a9367e304401a1cc371ac88c925d
-
SHA1
333c1712469d7cec53bda8da8ab4e73f0dfe53f0
-
SHA256
8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe
-
SHA512
cfdd0ffe792a41d6c3c84c19192d8c05886e3b3d46e8e953e9fb63d0cc5aa7c5cd2da1c5622a2482ebc1a288800c593751f23bd8e550d992bd92d61047296661
-
SSDEEP
3072:/fPtnpWBsL8t4WMRJpqvCSE70W8eAaV2w:XyskJMrgO7DAO2
Static task
static1
Behavioral task
behavioral1
Sample
8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe
-
Size
120KB
-
MD5
e556a9367e304401a1cc371ac88c925d
-
SHA1
333c1712469d7cec53bda8da8ab4e73f0dfe53f0
-
SHA256
8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe
-
SHA512
cfdd0ffe792a41d6c3c84c19192d8c05886e3b3d46e8e953e9fb63d0cc5aa7c5cd2da1c5622a2482ebc1a288800c593751f23bd8e550d992bd92d61047296661
-
SSDEEP
3072:/fPtnpWBsL8t4WMRJpqvCSE70W8eAaV2w:XyskJMrgO7DAO2
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5