General
-
Target
6ff5045d9f0d11a24be36ca4d15465305ced6578248a9532c00e2b1d355afbe0N.exe
-
Size
120KB
-
Sample
241216-rlb2patjhm
-
MD5
07614bb098a0c9f5463da84061674800
-
SHA1
65f4dd5a3cf6627aba66746b5a6a0413776e193d
-
SHA256
6ff5045d9f0d11a24be36ca4d15465305ced6578248a9532c00e2b1d355afbe0
-
SHA512
f0144c2f5c5c95c866d0d116082f46b078e35cbdba916fbb3c3873e87ca72a1a7a04a8ec052fdb43caaf5896e7f88f52d25b68b4aff71d55004961e66838f6e8
-
SSDEEP
3072:Y3BDQ6MAEtc0YZ7PB1ukqVGdljKQsGKb45KeY5TDTloynv:uDqAIfYMw5sGEeY5Tv6ynv
Static task
static1
Behavioral task
behavioral1
Sample
6ff5045d9f0d11a24be36ca4d15465305ced6578248a9532c00e2b1d355afbe0N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6ff5045d9f0d11a24be36ca4d15465305ced6578248a9532c00e2b1d355afbe0N.exe
-
Size
120KB
-
MD5
07614bb098a0c9f5463da84061674800
-
SHA1
65f4dd5a3cf6627aba66746b5a6a0413776e193d
-
SHA256
6ff5045d9f0d11a24be36ca4d15465305ced6578248a9532c00e2b1d355afbe0
-
SHA512
f0144c2f5c5c95c866d0d116082f46b078e35cbdba916fbb3c3873e87ca72a1a7a04a8ec052fdb43caaf5896e7f88f52d25b68b4aff71d55004961e66838f6e8
-
SSDEEP
3072:Y3BDQ6MAEtc0YZ7PB1ukqVGdljKQsGKb45KeY5TDTloynv:uDqAIfYMw5sGEeY5Tv6ynv
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5