General
-
Target
8f1c88dcb64332d1951a1d77061919b4ec7f48163345e38d0812c85a3b485f2dN.exe
-
Size
120KB
-
Sample
241217-d6t64syrbx
-
MD5
fa20184b0de9e22a8647f27a062ac520
-
SHA1
e93c8ef1085b5da9090e58d446d09a2d033f01c4
-
SHA256
8f1c88dcb64332d1951a1d77061919b4ec7f48163345e38d0812c85a3b485f2d
-
SHA512
68d359e56e8457fa38f289ae843b564129aab9f25a94cc9606c4c80f0684025f4fcaca7f44064d08f346acca6d445524d1af84001bafda99c12096464b66563d
-
SSDEEP
1536:lSnLvJP8TvwjrAF6B2Xms/J9CuHXFw6ESkgBJk8DiAzOcJxltuxYAYZIKSWMRNcC:MLasHq6QwHSj9OybuxYnWXRNc
Static task
static1
Behavioral task
behavioral1
Sample
8f1c88dcb64332d1951a1d77061919b4ec7f48163345e38d0812c85a3b485f2dN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8f1c88dcb64332d1951a1d77061919b4ec7f48163345e38d0812c85a3b485f2dN.exe
-
Size
120KB
-
MD5
fa20184b0de9e22a8647f27a062ac520
-
SHA1
e93c8ef1085b5da9090e58d446d09a2d033f01c4
-
SHA256
8f1c88dcb64332d1951a1d77061919b4ec7f48163345e38d0812c85a3b485f2d
-
SHA512
68d359e56e8457fa38f289ae843b564129aab9f25a94cc9606c4c80f0684025f4fcaca7f44064d08f346acca6d445524d1af84001bafda99c12096464b66563d
-
SSDEEP
1536:lSnLvJP8TvwjrAF6B2Xms/J9CuHXFw6ESkgBJk8DiAzOcJxltuxYAYZIKSWMRNcC:MLasHq6QwHSj9OybuxYnWXRNc
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5