General
-
Target
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf
-
Size
120KB
-
Sample
241216-eh7yqsvjgq
-
MD5
36ef8d9f850799f6681b1b0f36d77b14
-
SHA1
9d63f151db59043bd89e9ccbdf486360bed57f54
-
SHA256
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf
-
SHA512
bf9de43a58afefc44d235c463887984b7cf168e3c986675eaf9ecb4e9ee7d9062b4ae8180f264e38e893a6a5ae421f90c25eed7f6cfca22f2f4f6b2b8db94a41
-
SSDEEP
3072:6jK8wjj91Rl/jBw79cA5A8q9kuP9jI4tQ:6Ozzb/twRcA5B2kuiL
Static task
static1
Behavioral task
behavioral1
Sample
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf
-
Size
120KB
-
MD5
36ef8d9f850799f6681b1b0f36d77b14
-
SHA1
9d63f151db59043bd89e9ccbdf486360bed57f54
-
SHA256
e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf
-
SHA512
bf9de43a58afefc44d235c463887984b7cf168e3c986675eaf9ecb4e9ee7d9062b4ae8180f264e38e893a6a5ae421f90c25eed7f6cfca22f2f4f6b2b8db94a41
-
SSDEEP
3072:6jK8wjj91Rl/jBw79cA5A8q9kuP9jI4tQ:6Ozzb/twRcA5B2kuiL
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5