General
-
Target
ab52f4804fefb4da6358e702db19d96b1cff9aa7a3a0420ddb670b403125bd0a
-
Size
120KB
-
Sample
241227-bykllaxrh1
-
MD5
9d46ce1a9b473724c45c5ad4dba426aa
-
SHA1
b98e24f522fb0353846dbe7363213bc78f73a4ed
-
SHA256
ab52f4804fefb4da6358e702db19d96b1cff9aa7a3a0420ddb670b403125bd0a
-
SHA512
afd3618b7266289e4f363907ef624f4a97c82206b2b5b4dbc1d381da00eea55fc805228a9b5b5262bf62f36fb843d4836c34ca48d35649b90f1f583633019731
-
SSDEEP
3072:5g5aDTt75iAkJSFzVUH/XuXx5u8JYE19P:5g58TZ51F2fsx5bF
Static task
static1
Behavioral task
behavioral1
Sample
ab52f4804fefb4da6358e702db19d96b1cff9aa7a3a0420ddb670b403125bd0a.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ab52f4804fefb4da6358e702db19d96b1cff9aa7a3a0420ddb670b403125bd0a
-
Size
120KB
-
MD5
9d46ce1a9b473724c45c5ad4dba426aa
-
SHA1
b98e24f522fb0353846dbe7363213bc78f73a4ed
-
SHA256
ab52f4804fefb4da6358e702db19d96b1cff9aa7a3a0420ddb670b403125bd0a
-
SHA512
afd3618b7266289e4f363907ef624f4a97c82206b2b5b4dbc1d381da00eea55fc805228a9b5b5262bf62f36fb843d4836c34ca48d35649b90f1f583633019731
-
SSDEEP
3072:5g5aDTt75iAkJSFzVUH/XuXx5u8JYE19P:5g58TZ51F2fsx5bF
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5