General
-
Target
66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062.exe
-
Size
120KB
-
Sample
241217-j85nhswlcq
-
MD5
cca2e89127b69f63cadf73e76bc2fedb
-
SHA1
c9083603791557d664a9562da6c7c682bfef087f
-
SHA256
66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062
-
SHA512
62d8682fe7942cd91840d77afc946baa3e9b81709be4e633b7df0a7223a5f2c1bb27ac800be3123ef064d1eacd1e9251f278eec753a14eb30be6d9d61d359e88
-
SSDEEP
1536:4RbFheFGVax37zNxA9Eobg04n/bQ6PS/ZVY/o7S5PEGIx5DKf2hCHLSG3D7Ydxb9:4ReUV2PATubQbY/5cJTDR3FXCtJy
Static task
static1
Behavioral task
behavioral1
Sample
66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062.exe
-
Size
120KB
-
MD5
cca2e89127b69f63cadf73e76bc2fedb
-
SHA1
c9083603791557d664a9562da6c7c682bfef087f
-
SHA256
66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062
-
SHA512
62d8682fe7942cd91840d77afc946baa3e9b81709be4e633b7df0a7223a5f2c1bb27ac800be3123ef064d1eacd1e9251f278eec753a14eb30be6d9d61d359e88
-
SSDEEP
1536:4RbFheFGVax37zNxA9Eobg04n/bQ6PS/ZVY/o7S5PEGIx5DKf2hCHLSG3D7Ydxb9:4ReUV2PATubQbY/5cJTDR3FXCtJy
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5