General
-
Target
9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee
-
Size
120KB
-
Sample
241220-fbx1ma1ken
-
MD5
fb7c28093cd2e889cd088e879d23144b
-
SHA1
c6f6a3d4c3058bacc50b7dab17ebb1c48cef6b91
-
SHA256
9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee
-
SHA512
4244c7cc42f18d3f1e2e3a72027aa7403e71bffbb2a2157cd00590949e19b4b66f50ad1bf034d3a0d5ee4bb264d7314f0e0b964a3ace094e8ed4f7e573edf333
-
SSDEEP
3072:znDNQq+K2zQNRxpvB8LjLj6Uo0DX6GVA1kbUD:zn2XXzmztBWDs02N1SU
Static task
static1
Behavioral task
behavioral1
Sample
9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee
-
Size
120KB
-
MD5
fb7c28093cd2e889cd088e879d23144b
-
SHA1
c6f6a3d4c3058bacc50b7dab17ebb1c48cef6b91
-
SHA256
9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee
-
SHA512
4244c7cc42f18d3f1e2e3a72027aa7403e71bffbb2a2157cd00590949e19b4b66f50ad1bf034d3a0d5ee4bb264d7314f0e0b964a3ace094e8ed4f7e573edf333
-
SSDEEP
3072:znDNQq+K2zQNRxpvB8LjLj6Uo0DX6GVA1kbUD:zn2XXzmztBWDs02N1SU
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5