General
-
Target
6b57652223f559721657428746c6421f1acf5584f81181fdcb8d88dd631f9f1aN.exe
-
Size
120KB
-
Sample
241220-gkh4ha1mgv
-
MD5
9f146c20bd959c185190575c1a2a9030
-
SHA1
a58385455132d2245b939e0e5c654f6c44d2f6c8
-
SHA256
6b57652223f559721657428746c6421f1acf5584f81181fdcb8d88dd631f9f1a
-
SHA512
8831e1217f10bf74489a32ffb52456671e18dd8d0e41e09ad6c162e6d181fa004b159b3e594d88ad081661d416b6d9fe1936bb6f22a0c0798a8fd4ca7b2962d0
-
SSDEEP
3072:7/tuhZPos0a3W9AXVIdrL0TSp1P4t0O1:7/tyZgDanIdEaN4n1
Static task
static1
Behavioral task
behavioral1
Sample
6b57652223f559721657428746c6421f1acf5584f81181fdcb8d88dd631f9f1aN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6b57652223f559721657428746c6421f1acf5584f81181fdcb8d88dd631f9f1aN.exe
-
Size
120KB
-
MD5
9f146c20bd959c185190575c1a2a9030
-
SHA1
a58385455132d2245b939e0e5c654f6c44d2f6c8
-
SHA256
6b57652223f559721657428746c6421f1acf5584f81181fdcb8d88dd631f9f1a
-
SHA512
8831e1217f10bf74489a32ffb52456671e18dd8d0e41e09ad6c162e6d181fa004b159b3e594d88ad081661d416b6d9fe1936bb6f22a0c0798a8fd4ca7b2962d0
-
SSDEEP
3072:7/tuhZPos0a3W9AXVIdrL0TSp1P4t0O1:7/tyZgDanIdEaN4n1
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5