General
-
Target
8121edee937ebeb02f1ab5c67e0a52f22c4d0dc7a33b7a765d594f6290535f9d
-
Size
120KB
-
Sample
241229-bp8basxqay
-
MD5
7d02eae10f6bf8a4b0acf68257c01b55
-
SHA1
a6101f067956881d067280589d9ee85cf59f8b73
-
SHA256
8121edee937ebeb02f1ab5c67e0a52f22c4d0dc7a33b7a765d594f6290535f9d
-
SHA512
28afbac3794f09ee536c43fec171533eb8272afad9871d3881829369686f907860b4cf47acd89fc221abb58c55683bfdbd2fc210c0e00a79a04e82cd5687aa9e
-
SSDEEP
3072:oDDOLrPp4/NDogsuBPkE2U1Xsb1+zNLKU/Ulz:oJ5oRgPkE24E+p2+Gz
Static task
static1
Behavioral task
behavioral1
Sample
8121edee937ebeb02f1ab5c67e0a52f22c4d0dc7a33b7a765d594f6290535f9d.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8121edee937ebeb02f1ab5c67e0a52f22c4d0dc7a33b7a765d594f6290535f9d
-
Size
120KB
-
MD5
7d02eae10f6bf8a4b0acf68257c01b55
-
SHA1
a6101f067956881d067280589d9ee85cf59f8b73
-
SHA256
8121edee937ebeb02f1ab5c67e0a52f22c4d0dc7a33b7a765d594f6290535f9d
-
SHA512
28afbac3794f09ee536c43fec171533eb8272afad9871d3881829369686f907860b4cf47acd89fc221abb58c55683bfdbd2fc210c0e00a79a04e82cd5687aa9e
-
SSDEEP
3072:oDDOLrPp4/NDogsuBPkE2U1Xsb1+zNLKU/Ulz:oJ5oRgPkE24E+p2+Gz
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5