General
-
Target
f00b2d2d09fe49949de8124d5cdfc37cde71e7f1ad9a2a6a1eb79a18350c57f4
-
Size
120KB
-
Sample
241221-g9lwpavnbz
-
MD5
0377d1e4243d8eb5cdbcfd6ee02db0dc
-
SHA1
412d7258957782e23f95a3906d651adfc2cca90d
-
SHA256
f00b2d2d09fe49949de8124d5cdfc37cde71e7f1ad9a2a6a1eb79a18350c57f4
-
SHA512
1f3c9518bd697a56f4f36d1849977a54e68c519463133d1005b3dc0c18487a3ea916048a32095e5d8d439e2fb14db522f65a38c4704ea6c5de6a5fe8dde9fed0
-
SSDEEP
1536:HpGmleHJo1/OHCy/qrBrXovssgYEaYm2yXiHwRypxoO0Qb/8t9:wrprHl/8rXovXgxaYmncXipQQ9
Static task
static1
Behavioral task
behavioral1
Sample
f00b2d2d09fe49949de8124d5cdfc37cde71e7f1ad9a2a6a1eb79a18350c57f4.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f00b2d2d09fe49949de8124d5cdfc37cde71e7f1ad9a2a6a1eb79a18350c57f4
-
Size
120KB
-
MD5
0377d1e4243d8eb5cdbcfd6ee02db0dc
-
SHA1
412d7258957782e23f95a3906d651adfc2cca90d
-
SHA256
f00b2d2d09fe49949de8124d5cdfc37cde71e7f1ad9a2a6a1eb79a18350c57f4
-
SHA512
1f3c9518bd697a56f4f36d1849977a54e68c519463133d1005b3dc0c18487a3ea916048a32095e5d8d439e2fb14db522f65a38c4704ea6c5de6a5fe8dde9fed0
-
SSDEEP
1536:HpGmleHJo1/OHCy/qrBrXovssgYEaYm2yXiHwRypxoO0Qb/8t9:wrprHl/8rXovXgxaYmncXipQQ9
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5