General
-
Target
468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e
-
Size
120KB
-
Sample
241220-3qh7caxmer
-
MD5
0f579acab2ea583ad8570e66ecf4ebb1
-
SHA1
f0920b7cda926e9d6e8523a079be346640fd8b7b
-
SHA256
468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e
-
SHA512
07d9d9988c89dfe662c3fbb1f01910f076a6abfa00f759c5c97b311a90cd0399436d1a106b94f1fab2e11fcfb6a700cab105d341b26b931db9af00b342c4d443
-
SSDEEP
3072:uCqgNr9CnbEoMzkj/9gl9O64MOxXZToIW4QHwx5:ZqyMVMzkj/OjOWMXKIWnQP
Static task
static1
Behavioral task
behavioral1
Sample
468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e
-
Size
120KB
-
MD5
0f579acab2ea583ad8570e66ecf4ebb1
-
SHA1
f0920b7cda926e9d6e8523a079be346640fd8b7b
-
SHA256
468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e
-
SHA512
07d9d9988c89dfe662c3fbb1f01910f076a6abfa00f759c5c97b311a90cd0399436d1a106b94f1fab2e11fcfb6a700cab105d341b26b931db9af00b342c4d443
-
SSDEEP
3072:uCqgNr9CnbEoMzkj/9gl9O64MOxXZToIW4QHwx5:ZqyMVMzkj/OjOWMXKIWnQP
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5