General
-
Target
27de9e4980f60d63b20bbe155f97b9a7b3b47b15b94fbf59197e2dbbc8359e43.exe
-
Size
120KB
-
Sample
241218-gv4g7axpgq
-
MD5
bcac25a742dc6b230b7aaf593f22a086
-
SHA1
dcca2ec364493ce09dc8f443873aabe2c0781682
-
SHA256
27de9e4980f60d63b20bbe155f97b9a7b3b47b15b94fbf59197e2dbbc8359e43
-
SHA512
80ec85721c6e12b34ce322b907d44819473bda98a01b9e33a94b55351153d1fb8bb17ac40ae82e92b3eb5871bcfc9caf96b8ee70eaa06e599e064f5315575c3c
-
SSDEEP
3072:cFmdaG5KraU4n+AIz+EfRSPhWHP63zDH8r:cF0aGlgrf2hWKXW
Static task
static1
Behavioral task
behavioral1
Sample
27de9e4980f60d63b20bbe155f97b9a7b3b47b15b94fbf59197e2dbbc8359e43.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
27de9e4980f60d63b20bbe155f97b9a7b3b47b15b94fbf59197e2dbbc8359e43.exe
-
Size
120KB
-
MD5
bcac25a742dc6b230b7aaf593f22a086
-
SHA1
dcca2ec364493ce09dc8f443873aabe2c0781682
-
SHA256
27de9e4980f60d63b20bbe155f97b9a7b3b47b15b94fbf59197e2dbbc8359e43
-
SHA512
80ec85721c6e12b34ce322b907d44819473bda98a01b9e33a94b55351153d1fb8bb17ac40ae82e92b3eb5871bcfc9caf96b8ee70eaa06e599e064f5315575c3c
-
SSDEEP
3072:cFmdaG5KraU4n+AIz+EfRSPhWHP63zDH8r:cF0aGlgrf2hWKXW
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5