General
-
Target
b98888db466f82e02704c2ce13fd717c490b8a136fe41a2e56cd3f283240332f.exe
-
Size
120KB
-
Sample
241217-b44lnaxmdp
-
MD5
bb95d58530ab9ff27543a4a43ee47b55
-
SHA1
e2d20aeecb70cbe9414510ca09126c00ef4a7a8f
-
SHA256
b98888db466f82e02704c2ce13fd717c490b8a136fe41a2e56cd3f283240332f
-
SHA512
142d6d0d15cc6ccba0f6d762837ab7a338fecf4a76c6bfc246715ab0fbc865b96fbda481fe65aab88b2fea94535a28827af55b650f8846fa9beae99bc6b23341
-
SSDEEP
1536:MP1yCugTdpTc5XnzNEQyesvPX2o2pYv8HOo0l9wXRghTNNkTnIQgCMLJpKj3J:MP0gdVGBEQyBPv2pYTok98IqvMLv0
Static task
static1
Behavioral task
behavioral1
Sample
b98888db466f82e02704c2ce13fd717c490b8a136fe41a2e56cd3f283240332f.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b98888db466f82e02704c2ce13fd717c490b8a136fe41a2e56cd3f283240332f.exe
-
Size
120KB
-
MD5
bb95d58530ab9ff27543a4a43ee47b55
-
SHA1
e2d20aeecb70cbe9414510ca09126c00ef4a7a8f
-
SHA256
b98888db466f82e02704c2ce13fd717c490b8a136fe41a2e56cd3f283240332f
-
SHA512
142d6d0d15cc6ccba0f6d762837ab7a338fecf4a76c6bfc246715ab0fbc865b96fbda481fe65aab88b2fea94535a28827af55b650f8846fa9beae99bc6b23341
-
SSDEEP
1536:MP1yCugTdpTc5XnzNEQyesvPX2o2pYv8HOo0l9wXRghTNNkTnIQgCMLJpKj3J:MP0gdVGBEQyBPv2pYTok98IqvMLv0
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5