General
-
Target
6a646836db400d75f4bb3b2ef0b2317cf1dce154862494d4d805695308be5006N.exe
-
Size
120KB
-
Sample
241219-dd6pfavndl
-
MD5
0a6c8457f3ee242f2559b973a7690870
-
SHA1
254001c5cfa57e2126518239af70d7b89d3fbfc2
-
SHA256
6a646836db400d75f4bb3b2ef0b2317cf1dce154862494d4d805695308be5006
-
SHA512
bd2fe6b8e37a5429aac274c3b31d7b5d97187d28471777712f33d7e2f104dc19891b18e511c9bd63ebb0c1a75d88e5a997767a6720276933f7557a6054ebca06
-
SSDEEP
1536:IawtvhzPFCLpSU7gvAzsIWI9Np/hBgASj+9d8AYRmXKWcmXVGvvlrXQfmm:IauvhztIAU7zzsZSNppBV3mXWcmokmm
Static task
static1
Behavioral task
behavioral1
Sample
6a646836db400d75f4bb3b2ef0b2317cf1dce154862494d4d805695308be5006N.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6a646836db400d75f4bb3b2ef0b2317cf1dce154862494d4d805695308be5006N.exe
-
Size
120KB
-
MD5
0a6c8457f3ee242f2559b973a7690870
-
SHA1
254001c5cfa57e2126518239af70d7b89d3fbfc2
-
SHA256
6a646836db400d75f4bb3b2ef0b2317cf1dce154862494d4d805695308be5006
-
SHA512
bd2fe6b8e37a5429aac274c3b31d7b5d97187d28471777712f33d7e2f104dc19891b18e511c9bd63ebb0c1a75d88e5a997767a6720276933f7557a6054ebca06
-
SSDEEP
1536:IawtvhzPFCLpSU7gvAzsIWI9Np/hBgASj+9d8AYRmXKWcmXVGvvlrXQfmm:IauvhztIAU7zzsZSNppBV3mXWcmokmm
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5