General
-
Target
d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd
-
Size
120KB
-
Sample
241216-d44yjatmdm
-
MD5
bfc69a4f69252f97061b9edec1256684
-
SHA1
72dfb4b1a5ad38b4ac03f00f959a2cd5fd6f3d51
-
SHA256
d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd
-
SHA512
a7adc1675939f9a2af4c684db5e31ee2cf34f595b93ee75f0caa23191f4eae3d33bd536ad1da239919cefaa9a94097af6af590670c0b2da539486835f48edab2
-
SSDEEP
3072:B8hgEkAFs/tcPWln92Xu4hZjfn+zaGKfZVNGT/7:A6Ay/iPWN92BhZrYWfGj
Static task
static1
Behavioral task
behavioral1
Sample
d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd
-
Size
120KB
-
MD5
bfc69a4f69252f97061b9edec1256684
-
SHA1
72dfb4b1a5ad38b4ac03f00f959a2cd5fd6f3d51
-
SHA256
d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd
-
SHA512
a7adc1675939f9a2af4c684db5e31ee2cf34f595b93ee75f0caa23191f4eae3d33bd536ad1da239919cefaa9a94097af6af590670c0b2da539486835f48edab2
-
SSDEEP
3072:B8hgEkAFs/tcPWln92Xu4hZjfn+zaGKfZVNGT/7:A6Ay/iPWN92BhZrYWfGj
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5