General
-
Target
60d71e68f5035f3df023a99fe66cf8c30b3006d4ba4fb26789344ddac8384f14
-
Size
120KB
-
Sample
241226-2snn6stncs
-
MD5
5e4cc9cec3bf4b2c199cc438e891c438
-
SHA1
bcb7d65318808786cb9087a0ba44c0a5c0da76bc
-
SHA256
60d71e68f5035f3df023a99fe66cf8c30b3006d4ba4fb26789344ddac8384f14
-
SHA512
2d4d1ac0a696e89eade33090dbc0d339c8ef0d5c13b0c6e58287938cb838dfdd59f99388b6df3fac0e7c620c063679e5581ec12484e125e30a925cb9741dcf8a
-
SSDEEP
3072:WMEcws6wYSnArHrGh5lWW7ZgItQGDQ9DYg0sNig:WMGsBAL4lp7qIQ9Db9ig
Static task
static1
Behavioral task
behavioral1
Sample
60d71e68f5035f3df023a99fe66cf8c30b3006d4ba4fb26789344ddac8384f14.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
60d71e68f5035f3df023a99fe66cf8c30b3006d4ba4fb26789344ddac8384f14
-
Size
120KB
-
MD5
5e4cc9cec3bf4b2c199cc438e891c438
-
SHA1
bcb7d65318808786cb9087a0ba44c0a5c0da76bc
-
SHA256
60d71e68f5035f3df023a99fe66cf8c30b3006d4ba4fb26789344ddac8384f14
-
SHA512
2d4d1ac0a696e89eade33090dbc0d339c8ef0d5c13b0c6e58287938cb838dfdd59f99388b6df3fac0e7c620c063679e5581ec12484e125e30a925cb9741dcf8a
-
SSDEEP
3072:WMEcws6wYSnArHrGh5lWW7ZgItQGDQ9DYg0sNig:WMGsBAL4lp7qIQ9Db9ig
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5