General
-
Target
efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566
-
Size
120KB
-
Sample
241228-ewc1hsvrgv
-
MD5
9b82742a7982e5566ccd71d27601cefc
-
SHA1
cee59a8b6e0fe2ebd0ef94986af30c8865de6d9b
-
SHA256
efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566
-
SHA512
9cb3bf33719c54fc1361f20ecd7c4d9dede60cdf976a891f8992b8dc23200c2028740308b4793b1ba2d5de6303562b25c62eea65f94a0ac489b68fd31018fbcc
-
SSDEEP
1536:UllswVuGrR4bFb31iv9HqEVviq/AuPGQYrp8y5V8Gg3tZ2+Itccj2d4ru/ibY:S2w9rR0biPV4mYrp8yj8GuImChu/i0
Static task
static1
Behavioral task
behavioral1
Sample
efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566
-
Size
120KB
-
MD5
9b82742a7982e5566ccd71d27601cefc
-
SHA1
cee59a8b6e0fe2ebd0ef94986af30c8865de6d9b
-
SHA256
efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566
-
SHA512
9cb3bf33719c54fc1361f20ecd7c4d9dede60cdf976a891f8992b8dc23200c2028740308b4793b1ba2d5de6303562b25c62eea65f94a0ac489b68fd31018fbcc
-
SSDEEP
1536:UllswVuGrR4bFb31iv9HqEVviq/AuPGQYrp8y5V8Gg3tZ2+Itccj2d4ru/ibY:S2w9rR0biPV4mYrp8yj8GuImChu/i0
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5