General
-
Target
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.exe
-
Size
120KB
-
Sample
241222-hhb3vaxqbx
-
MD5
4e079bea91961cb95b37607a010c8092
-
SHA1
5f9fdd19170ab411176f9eb6ed7e4a7b76a70560
-
SHA256
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c
-
SHA512
0c7fd5959c8eedc391c0e194a845df35062df6780392286cd41d270f7a4c3b26bb1ae6cc324a3be88811115ac1d5bad5c4f6cf9d9b026332161d58081061cfef
-
SSDEEP
3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0y:PObtD18gJqfD6FUL5+kfa0y
Static task
static1
Behavioral task
behavioral1
Sample
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c.exe
-
Size
120KB
-
MD5
4e079bea91961cb95b37607a010c8092
-
SHA1
5f9fdd19170ab411176f9eb6ed7e4a7b76a70560
-
SHA256
906112bff82ce544eb488aa538bc50644038d743c75fdc74c5b7eb9281be6b2c
-
SHA512
0c7fd5959c8eedc391c0e194a845df35062df6780392286cd41d270f7a4c3b26bb1ae6cc324a3be88811115ac1d5bad5c4f6cf9d9b026332161d58081061cfef
-
SSDEEP
3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0y:PObtD18gJqfD6FUL5+kfa0y
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5