General
-
Target
191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98
-
Size
120KB
-
Sample
241222-ywwx6sxmgx
-
MD5
f4cf9357e33cff6728cc7a13e5abfd11
-
SHA1
1bd6a7c6313962363031641aa64ad27d142c76df
-
SHA256
191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98
-
SHA512
dbea9ac3f3b74225b812dc74aec38c7acc511fb76f008937e7a7f5aeb8c5f4d1dfedd5d6497d4ccfc4a12cb864e214d48703434563db6bb87043bc33054382d2
-
SSDEEP
1536:skGQ2bUozt646GLLAHLK2pQnnMFeI9fLZD/9PYi2FMZnEo2P36:jGpz5L8LKi3jZWinOP
Static task
static1
Behavioral task
behavioral1
Sample
191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98
-
Size
120KB
-
MD5
f4cf9357e33cff6728cc7a13e5abfd11
-
SHA1
1bd6a7c6313962363031641aa64ad27d142c76df
-
SHA256
191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98
-
SHA512
dbea9ac3f3b74225b812dc74aec38c7acc511fb76f008937e7a7f5aeb8c5f4d1dfedd5d6497d4ccfc4a12cb864e214d48703434563db6bb87043bc33054382d2
-
SSDEEP
1536:skGQ2bUozt646GLLAHLK2pQnnMFeI9fLZD/9PYi2FMZnEo2P36:jGpz5L8LKi3jZWinOP
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5