General
-
Target
800c8aac7537c1fc3575bcfbc5674bbc1f36db8603f881ecf93003f8a6356dc8.exe
-
Size
120KB
-
Sample
241217-x1171swnhm
-
MD5
4cbec605e5ed1d3462d4a5b4b53db003
-
SHA1
c208ab93c731fab60cad427f47e2c1267dfb3b76
-
SHA256
800c8aac7537c1fc3575bcfbc5674bbc1f36db8603f881ecf93003f8a6356dc8
-
SHA512
9c6d01073bf6d6f203e396454385442d11fa8b977486e4bb8f9c1ff88043d42ea05c4d9bf0c9fcf95f11950030f0b26c0d0938a967e23d10e872f66ed01abdb4
-
SSDEEP
3072:gWF3SyZKlBuPwFY8EyRQcxLuwypnRXO0Hj+la8cdx:FS2wFY7bcxqvDX1ala3
Static task
static1
Behavioral task
behavioral1
Sample
800c8aac7537c1fc3575bcfbc5674bbc1f36db8603f881ecf93003f8a6356dc8.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
800c8aac7537c1fc3575bcfbc5674bbc1f36db8603f881ecf93003f8a6356dc8.exe
-
Size
120KB
-
MD5
4cbec605e5ed1d3462d4a5b4b53db003
-
SHA1
c208ab93c731fab60cad427f47e2c1267dfb3b76
-
SHA256
800c8aac7537c1fc3575bcfbc5674bbc1f36db8603f881ecf93003f8a6356dc8
-
SHA512
9c6d01073bf6d6f203e396454385442d11fa8b977486e4bb8f9c1ff88043d42ea05c4d9bf0c9fcf95f11950030f0b26c0d0938a967e23d10e872f66ed01abdb4
-
SSDEEP
3072:gWF3SyZKlBuPwFY8EyRQcxLuwypnRXO0Hj+la8cdx:FS2wFY7bcxqvDX1ala3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5