General
-
Target
0f6666e6ccfe49a64b2fa03b8553ee4ed6481d63d40b4528259631829d17e4ddN.exe
-
Size
120KB
-
Sample
241216-pxaa5azrhy
-
MD5
1df6759292c65b56bfbeb17fbdf71450
-
SHA1
9f8dcc4b9f56ca8433ba6d1bf9231c061b72fc63
-
SHA256
0f6666e6ccfe49a64b2fa03b8553ee4ed6481d63d40b4528259631829d17e4dd
-
SHA512
890df0f7a8b6596dab3edb637107c3dc8dfadfb4d43d326c14352f9af68df9916344f31e77f19095d7b93b90074c9dd4be7dd59b256b9adc777b69bf5dc34a75
-
SSDEEP
3072:rVRJErz6WGso6oemBbMuArzAkSo9i5EuX:rVR8d/5uArzAXo9i5D
Static task
static1
Behavioral task
behavioral1
Sample
0f6666e6ccfe49a64b2fa03b8553ee4ed6481d63d40b4528259631829d17e4ddN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0f6666e6ccfe49a64b2fa03b8553ee4ed6481d63d40b4528259631829d17e4ddN.exe
-
Size
120KB
-
MD5
1df6759292c65b56bfbeb17fbdf71450
-
SHA1
9f8dcc4b9f56ca8433ba6d1bf9231c061b72fc63
-
SHA256
0f6666e6ccfe49a64b2fa03b8553ee4ed6481d63d40b4528259631829d17e4dd
-
SHA512
890df0f7a8b6596dab3edb637107c3dc8dfadfb4d43d326c14352f9af68df9916344f31e77f19095d7b93b90074c9dd4be7dd59b256b9adc777b69bf5dc34a75
-
SSDEEP
3072:rVRJErz6WGso6oemBbMuArzAkSo9i5EuX:rVR8d/5uArzAXo9i5D
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5