General
-
Target
6627a580770107cb0d00432a6d85a2b2132e5502b0428138719454524f979019.exe
-
Size
120KB
-
Sample
241217-mv2aqaxmd1
-
MD5
ff2deedae579d820fec0e81898ddd2b8
-
SHA1
299a48d3ae0c48f3a6765c4c373e9fa41df39375
-
SHA256
6627a580770107cb0d00432a6d85a2b2132e5502b0428138719454524f979019
-
SHA512
9c6e595a6cca14b9410019412d464905129fcd32888da8439367f03957685ebedcaa056dbb8e2cda4062c6c9e42e5724b02daa204b11eafb7bb924f22cd8a4cc
-
SSDEEP
1536:mwYhS7/ocx823mlEQyraNYjFAIFpOIj66x++UPmC9nP3NuU8KBEJt6qEeS/:mzi/ocG2fC0xH6WLrC9nPdIhD6kS/
Static task
static1
Behavioral task
behavioral1
Sample
6627a580770107cb0d00432a6d85a2b2132e5502b0428138719454524f979019.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6627a580770107cb0d00432a6d85a2b2132e5502b0428138719454524f979019.exe
-
Size
120KB
-
MD5
ff2deedae579d820fec0e81898ddd2b8
-
SHA1
299a48d3ae0c48f3a6765c4c373e9fa41df39375
-
SHA256
6627a580770107cb0d00432a6d85a2b2132e5502b0428138719454524f979019
-
SHA512
9c6e595a6cca14b9410019412d464905129fcd32888da8439367f03957685ebedcaa056dbb8e2cda4062c6c9e42e5724b02daa204b11eafb7bb924f22cd8a4cc
-
SSDEEP
1536:mwYhS7/ocx823mlEQyraNYjFAIFpOIj66x++UPmC9nP3NuU8KBEJt6qEeS/:mzi/ocG2fC0xH6WLrC9nPdIhD6kS/
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5