General
-
Target
8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0
-
Size
120KB
-
Sample
241221-cvy59aznex
-
MD5
d958bb5131c9a2d15dca5a61cd68c327
-
SHA1
11aaa06539ce20ff6b76c057d754c0c0246451ee
-
SHA256
8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0
-
SHA512
162d5fca7dcba87e3d28efcbf2070168141176207c51f4697af7008779011bd595769ade6d98539c6dd528757c313ee3f7573643dba9af17e0adbc1fe59534fe
-
SSDEEP
1536:ONSqMf2cyi5YCZ40IVL7C49cOlg6oowismbeAODjkMoMoi+I79:RfF406L7CacOlg6MiPexYMoMB
Static task
static1
Behavioral task
behavioral1
Sample
8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0
-
Size
120KB
-
MD5
d958bb5131c9a2d15dca5a61cd68c327
-
SHA1
11aaa06539ce20ff6b76c057d754c0c0246451ee
-
SHA256
8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0
-
SHA512
162d5fca7dcba87e3d28efcbf2070168141176207c51f4697af7008779011bd595769ade6d98539c6dd528757c313ee3f7573643dba9af17e0adbc1fe59534fe
-
SSDEEP
1536:ONSqMf2cyi5YCZ40IVL7C49cOlg6oowismbeAODjkMoMoi+I79:RfF406L7CacOlg6MiPexYMoMB
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5