General
-
Target
28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504
-
Size
120KB
-
Sample
241216-ze9nda1jcn
-
MD5
bd0d49f7d733d1b4daa3bcf9dfd78e13
-
SHA1
318d8d9f72239d65774868b540251519b7daa833
-
SHA256
28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504
-
SHA512
b0391246a880ed321cded42500a9df535cc61eade7efdb3fefc37a7902c6185e98470fdb8cac85784e46cfb1e4a3d1d9e56ac843a2066004ac8376be908bb761
-
SSDEEP
3072:ICh8HZZDtsBrp55fz4xD5DXS8ibvMxVBhWb:RgXDtwr75fodS8LZh
Static task
static1
Behavioral task
behavioral1
Sample
28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504
-
Size
120KB
-
MD5
bd0d49f7d733d1b4daa3bcf9dfd78e13
-
SHA1
318d8d9f72239d65774868b540251519b7daa833
-
SHA256
28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504
-
SHA512
b0391246a880ed321cded42500a9df535cc61eade7efdb3fefc37a7902c6185e98470fdb8cac85784e46cfb1e4a3d1d9e56ac843a2066004ac8376be908bb761
-
SSDEEP
3072:ICh8HZZDtsBrp55fz4xD5DXS8ibvMxVBhWb:RgXDtwr75fodS8LZh
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5