General
-
Target
6460a933a130436cafc6ddd84e45bb7adf74a6bbe71badc08375549c9e01b9ecN.exe
-
Size
120KB
-
Sample
241226-eswy8awpev
-
MD5
dd3fd8786ef2467698507ac6c14311b0
-
SHA1
33180e9e372d8bbdbb6f82bbcf9a6358a1361496
-
SHA256
6460a933a130436cafc6ddd84e45bb7adf74a6bbe71badc08375549c9e01b9ec
-
SHA512
dd5dbfe35743d85f955619b4c631fd9fe941b8b703b4083d04f6c549d0017676771e4a723dd4d8494a8b08562d0b3a8c4aa02d5fa21ea376a262b2e8e0650ddd
-
SSDEEP
3072:DurJV73HZfBR7qQEgUCiJTmv7jUcVzh7:UL5f7jETCiYnj3
Static task
static1
Behavioral task
behavioral1
Sample
6460a933a130436cafc6ddd84e45bb7adf74a6bbe71badc08375549c9e01b9ecN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6460a933a130436cafc6ddd84e45bb7adf74a6bbe71badc08375549c9e01b9ecN.exe
-
Size
120KB
-
MD5
dd3fd8786ef2467698507ac6c14311b0
-
SHA1
33180e9e372d8bbdbb6f82bbcf9a6358a1361496
-
SHA256
6460a933a130436cafc6ddd84e45bb7adf74a6bbe71badc08375549c9e01b9ec
-
SHA512
dd5dbfe35743d85f955619b4c631fd9fe941b8b703b4083d04f6c549d0017676771e4a723dd4d8494a8b08562d0b3a8c4aa02d5fa21ea376a262b2e8e0650ddd
-
SSDEEP
3072:DurJV73HZfBR7qQEgUCiJTmv7jUcVzh7:UL5f7jETCiYnj3
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5