General
-
Target
6c71116d97ce15f797e3397f38345a68ecc1f5cfef88f155c76152a6acf1e6e1N.exe
-
Size
120KB
-
Sample
241216-gbz1naxrgq
-
MD5
cfa76f5caa0d93252c203df38df55d10
-
SHA1
e34c9d3f3114d3a73025cb7f9f2ecd74a1a27db7
-
SHA256
6c71116d97ce15f797e3397f38345a68ecc1f5cfef88f155c76152a6acf1e6e1
-
SHA512
882acfce7ddb21c7dea64141e74a71000a104b78e1b45d7adebabd95f7e4683762466529c2811a40d41ea3ac420b13db136cc154014cbc87910906105a99a807
-
SSDEEP
3072:Cz7n2EU0BIkqau6V+VN2diav0g2VCFKXOpkJ6r:CX2Dkq368VNWJS6aYkM
Static task
static1
Behavioral task
behavioral1
Sample
6c71116d97ce15f797e3397f38345a68ecc1f5cfef88f155c76152a6acf1e6e1N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6c71116d97ce15f797e3397f38345a68ecc1f5cfef88f155c76152a6acf1e6e1N.exe
-
Size
120KB
-
MD5
cfa76f5caa0d93252c203df38df55d10
-
SHA1
e34c9d3f3114d3a73025cb7f9f2ecd74a1a27db7
-
SHA256
6c71116d97ce15f797e3397f38345a68ecc1f5cfef88f155c76152a6acf1e6e1
-
SHA512
882acfce7ddb21c7dea64141e74a71000a104b78e1b45d7adebabd95f7e4683762466529c2811a40d41ea3ac420b13db136cc154014cbc87910906105a99a807
-
SSDEEP
3072:Cz7n2EU0BIkqau6V+VN2diav0g2VCFKXOpkJ6r:CX2Dkq368VNWJS6aYkM
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5