General
-
Target
be133bd6be4eeaa7e77cff1037f0585213012c42b63144c6536105c655cbcabc.exe
-
Size
120KB
-
Sample
241217-avh3xsvley
-
MD5
6abdbfb1fe798e06ff71844ce517cc85
-
SHA1
188d762426798dbe512f96802f5f5319e3ea7da7
-
SHA256
be133bd6be4eeaa7e77cff1037f0585213012c42b63144c6536105c655cbcabc
-
SHA512
69da672b5fd9c5de07a824986e4c00fe4f4de9b33dcaaba5cc07dff637fa6afe3717d71949ffbe3c01848a197c7bb482fab7f88b2811b0f25fbf51b1b54aec3f
-
SSDEEP
3072:wm2CmkmaM/dxgc7GAujHMSe/w1NdW0lG1:wmAtv/doFj81
Static task
static1
Behavioral task
behavioral1
Sample
be133bd6be4eeaa7e77cff1037f0585213012c42b63144c6536105c655cbcabc.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
be133bd6be4eeaa7e77cff1037f0585213012c42b63144c6536105c655cbcabc.exe
-
Size
120KB
-
MD5
6abdbfb1fe798e06ff71844ce517cc85
-
SHA1
188d762426798dbe512f96802f5f5319e3ea7da7
-
SHA256
be133bd6be4eeaa7e77cff1037f0585213012c42b63144c6536105c655cbcabc
-
SHA512
69da672b5fd9c5de07a824986e4c00fe4f4de9b33dcaaba5cc07dff637fa6afe3717d71949ffbe3c01848a197c7bb482fab7f88b2811b0f25fbf51b1b54aec3f
-
SSDEEP
3072:wm2CmkmaM/dxgc7GAujHMSe/w1NdW0lG1:wmAtv/doFj81
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5