General
-
Target
cb55194a5e36e41897fee6f0f0b98dfffdc6632aa318d0c69efde2e66336ec7c.exe
-
Size
120KB
-
Sample
241217-kfgawsvpay
-
MD5
8f25387010996e0423a3cc38b4de8542
-
SHA1
472e7825409a4c76e266b035dd8a63acf2fe40d7
-
SHA256
cb55194a5e36e41897fee6f0f0b98dfffdc6632aa318d0c69efde2e66336ec7c
-
SHA512
981d22c59ba30d11a0c6fd86669a2044ed3d792bf4ad25d2b140bf2f64426b4165bd4c08a21e01fd2193346d488b95f4d84db86a1c4bc4c7c6742f881325b91f
-
SSDEEP
1536:lSnLvJP8TvwjrAF6B2Xms/J9CuHXFw6ESkgBJk8DiAzOcJxltuxYAYZIKSWMRNcz:MLasHq6QwHSj9OybuxYnWXRNcz
Static task
static1
Behavioral task
behavioral1
Sample
cb55194a5e36e41897fee6f0f0b98dfffdc6632aa318d0c69efde2e66336ec7c.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cb55194a5e36e41897fee6f0f0b98dfffdc6632aa318d0c69efde2e66336ec7c.exe
-
Size
120KB
-
MD5
8f25387010996e0423a3cc38b4de8542
-
SHA1
472e7825409a4c76e266b035dd8a63acf2fe40d7
-
SHA256
cb55194a5e36e41897fee6f0f0b98dfffdc6632aa318d0c69efde2e66336ec7c
-
SHA512
981d22c59ba30d11a0c6fd86669a2044ed3d792bf4ad25d2b140bf2f64426b4165bd4c08a21e01fd2193346d488b95f4d84db86a1c4bc4c7c6742f881325b91f
-
SSDEEP
1536:lSnLvJP8TvwjrAF6B2Xms/J9CuHXFw6ESkgBJk8DiAzOcJxltuxYAYZIKSWMRNcz:MLasHq6QwHSj9OybuxYnWXRNcz
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5