General
-
Target
fb6e0d5db2624fa6b29ac2dfe00bb3b2f381c93bda734a7e38dda444ae2f3d30
-
Size
120KB
-
Sample
241228-e7v1gawndj
-
MD5
a8577dc41daa73c88527ebb1a096542b
-
SHA1
bd6bf58afb2ce7ac8ede4d0ff7538df5c3fe2513
-
SHA256
fb6e0d5db2624fa6b29ac2dfe00bb3b2f381c93bda734a7e38dda444ae2f3d30
-
SHA512
6562701682789a7310310acecf30f37a5b9061aad04d0adb2b8bd7ab394ecee53855509e8e0cd7778ba89bb871e5b3edca5bf7ec068d8e98d1ede6e467664a73
-
SSDEEP
3072:lSB500WXOG2FGhasWjP0s53/y0J6qcCszey5WFma:c40WXKgasWjPR5y04qcC9ycv
Static task
static1
Behavioral task
behavioral1
Sample
fb6e0d5db2624fa6b29ac2dfe00bb3b2f381c93bda734a7e38dda444ae2f3d30.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fb6e0d5db2624fa6b29ac2dfe00bb3b2f381c93bda734a7e38dda444ae2f3d30
-
Size
120KB
-
MD5
a8577dc41daa73c88527ebb1a096542b
-
SHA1
bd6bf58afb2ce7ac8ede4d0ff7538df5c3fe2513
-
SHA256
fb6e0d5db2624fa6b29ac2dfe00bb3b2f381c93bda734a7e38dda444ae2f3d30
-
SHA512
6562701682789a7310310acecf30f37a5b9061aad04d0adb2b8bd7ab394ecee53855509e8e0cd7778ba89bb871e5b3edca5bf7ec068d8e98d1ede6e467664a73
-
SSDEEP
3072:lSB500WXOG2FGhasWjP0s53/y0J6qcCszey5WFma:c40WXKgasWjPR5y04qcC9ycv
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5