General
-
Target
8f6fa4177b3a6c76b5fd131dc1f5acee9a4eef1c1bda612926d07904c01b55a5
-
Size
120KB
-
Sample
241217-a4xbxavnhx
-
MD5
f52344eeebbdfe08e1631528ed56b36e
-
SHA1
1bae195695496781e8ac68c08ae686800187b86a
-
SHA256
8f6fa4177b3a6c76b5fd131dc1f5acee9a4eef1c1bda612926d07904c01b55a5
-
SHA512
2ce6b7f84ba31b51b9003bf8c9514a552d13b839ac0d5ad93a3f4f57abd93a12ac7bbb81455d395bc4bcd87de68f631fe892c0a789c12e05dc7962012f92dfd8
-
SSDEEP
1536:wOy253ZCGu9qkg06vJVPGjhuW4K/ajgfBzZ6pezKw4ZEkmaXZrM2bPP2L/loEAOt:1y9+kk66pjOzZ6pezydbprM27XEAO9K
Static task
static1
Behavioral task
behavioral1
Sample
8f6fa4177b3a6c76b5fd131dc1f5acee9a4eef1c1bda612926d07904c01b55a5.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8f6fa4177b3a6c76b5fd131dc1f5acee9a4eef1c1bda612926d07904c01b55a5
-
Size
120KB
-
MD5
f52344eeebbdfe08e1631528ed56b36e
-
SHA1
1bae195695496781e8ac68c08ae686800187b86a
-
SHA256
8f6fa4177b3a6c76b5fd131dc1f5acee9a4eef1c1bda612926d07904c01b55a5
-
SHA512
2ce6b7f84ba31b51b9003bf8c9514a552d13b839ac0d5ad93a3f4f57abd93a12ac7bbb81455d395bc4bcd87de68f631fe892c0a789c12e05dc7962012f92dfd8
-
SSDEEP
1536:wOy253ZCGu9qkg06vJVPGjhuW4K/ajgfBzZ6pezKw4ZEkmaXZrM2bPP2L/loEAOt:1y9+kk66pjOzZ6pezydbprM27XEAO9K
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5