General
-
Target
68f8d2a5446f872225c5d33aa80e64b69634803fd2c25747481c9334efe90f1a.exe
-
Size
120KB
-
Sample
241217-lm39nsxlcn
-
MD5
64a8dbd0f1aec232f9e853be88c92392
-
SHA1
b812d7614a8341c7860007eb18512f55eada09d0
-
SHA256
68f8d2a5446f872225c5d33aa80e64b69634803fd2c25747481c9334efe90f1a
-
SHA512
f08a64be0eee237d1494bce21cac3b5610cd2daa7bfc2b65759d6e82129b403b22bcb6cc44707db5762b84dccf37136e74be4c7b5750fd802e3699cbccfe7480
-
SSDEEP
3072:Vjv/JvAPqOAZf0e2mJhMLWiL0x7xci/KzdfE:Vj/JvROq8+SLWk27xcXZfE
Static task
static1
Behavioral task
behavioral1
Sample
68f8d2a5446f872225c5d33aa80e64b69634803fd2c25747481c9334efe90f1a.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
68f8d2a5446f872225c5d33aa80e64b69634803fd2c25747481c9334efe90f1a.exe
-
Size
120KB
-
MD5
64a8dbd0f1aec232f9e853be88c92392
-
SHA1
b812d7614a8341c7860007eb18512f55eada09d0
-
SHA256
68f8d2a5446f872225c5d33aa80e64b69634803fd2c25747481c9334efe90f1a
-
SHA512
f08a64be0eee237d1494bce21cac3b5610cd2daa7bfc2b65759d6e82129b403b22bcb6cc44707db5762b84dccf37136e74be4c7b5750fd802e3699cbccfe7480
-
SSDEEP
3072:Vjv/JvAPqOAZf0e2mJhMLWiL0x7xci/KzdfE:Vj/JvROq8+SLWk27xcXZfE
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5