General
-
Target
cd0ee77360e0e1550a046fcca71079a69dfafac7ec95b71d1afa27e0897fa4dc
-
Size
120KB
-
Sample
241223-dqnpdsvmbt
-
MD5
697c0f43d297b7fb6972fe3348a196a2
-
SHA1
607d52b228dc65b8da276100073a367c9023ebe3
-
SHA256
cd0ee77360e0e1550a046fcca71079a69dfafac7ec95b71d1afa27e0897fa4dc
-
SHA512
8f3d7a06622cfbe1a36c88cc502ecb5b576ccca7da0c05e7d600236cc07740cfcf6825f42e586fd4782ffad5124adbfbf365bbc9bdfa05ccbd647b8c08aed4a5
-
SSDEEP
3072:VO4ka2IJlXPt+ngA8jD4MHrlteqXstathe:VtkSlXPOetHBHsti
Static task
static1
Behavioral task
behavioral1
Sample
cd0ee77360e0e1550a046fcca71079a69dfafac7ec95b71d1afa27e0897fa4dc.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cd0ee77360e0e1550a046fcca71079a69dfafac7ec95b71d1afa27e0897fa4dc
-
Size
120KB
-
MD5
697c0f43d297b7fb6972fe3348a196a2
-
SHA1
607d52b228dc65b8da276100073a367c9023ebe3
-
SHA256
cd0ee77360e0e1550a046fcca71079a69dfafac7ec95b71d1afa27e0897fa4dc
-
SHA512
8f3d7a06622cfbe1a36c88cc502ecb5b576ccca7da0c05e7d600236cc07740cfcf6825f42e586fd4782ffad5124adbfbf365bbc9bdfa05ccbd647b8c08aed4a5
-
SSDEEP
3072:VO4ka2IJlXPt+ngA8jD4MHrlteqXstathe:VtkSlXPOetHBHsti
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5