General
-
Target
620b0bab5c60ab814d3b5135676626d880f91e56ce692f0689cb90833ca31c76
-
Size
120KB
-
Sample
241220-ax997avjhv
-
MD5
cc0fd9b0d58626d415de6d97a9957a76
-
SHA1
7f7a010827cd9985d855ece5087eb9d2ca764ccd
-
SHA256
620b0bab5c60ab814d3b5135676626d880f91e56ce692f0689cb90833ca31c76
-
SHA512
b8f119f8825a8cf866f5234d37952a0aadb50fdc7ce00e26e43c18ffd23a741e6868c4b3235199702811363ecd7322684a1463e2f545acf12b9afa2f8c0d542d
-
SSDEEP
3072:HsyCQWozvCVnlaZNW/d8pPzQzxLHbLUC0a:NFCplaRpPMz97LU0
Static task
static1
Behavioral task
behavioral1
Sample
620b0bab5c60ab814d3b5135676626d880f91e56ce692f0689cb90833ca31c76.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
620b0bab5c60ab814d3b5135676626d880f91e56ce692f0689cb90833ca31c76
-
Size
120KB
-
MD5
cc0fd9b0d58626d415de6d97a9957a76
-
SHA1
7f7a010827cd9985d855ece5087eb9d2ca764ccd
-
SHA256
620b0bab5c60ab814d3b5135676626d880f91e56ce692f0689cb90833ca31c76
-
SHA512
b8f119f8825a8cf866f5234d37952a0aadb50fdc7ce00e26e43c18ffd23a741e6868c4b3235199702811363ecd7322684a1463e2f545acf12b9afa2f8c0d542d
-
SSDEEP
3072:HsyCQWozvCVnlaZNW/d8pPzQzxLHbLUC0a:NFCplaRpPMz97LU0
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5