General
-
Target
b52b0bbb58836919f932b072429b988f797bd1dbca990c9d986b49db9dd2c5fe
-
Size
120KB
-
Sample
241229-dsffss1lbp
-
MD5
7cb949e49ec93bd0860a8fca517c6333
-
SHA1
cc025bd345fa2520bc7629f5959103ded86624ed
-
SHA256
b52b0bbb58836919f932b072429b988f797bd1dbca990c9d986b49db9dd2c5fe
-
SHA512
8fbf15373cd1d317b03bb7c284c2935f6f7bf0e0c9aafd0775c3d7bd1b91d4d11e3f1d4fd76b4d4bdc50761a78853728878a354d496c8e873bca4254dddb32fa
-
SSDEEP
1536:zG1U4xiIXaXliA/wRYRuPbxjSDFIinKU1sE2hE3gGV09bN1jhZhqyy0mXpVMGl:UUgP8PwO4ZShHxArjLu0msGl
Static task
static1
Behavioral task
behavioral1
Sample
b52b0bbb58836919f932b072429b988f797bd1dbca990c9d986b49db9dd2c5fe.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b52b0bbb58836919f932b072429b988f797bd1dbca990c9d986b49db9dd2c5fe
-
Size
120KB
-
MD5
7cb949e49ec93bd0860a8fca517c6333
-
SHA1
cc025bd345fa2520bc7629f5959103ded86624ed
-
SHA256
b52b0bbb58836919f932b072429b988f797bd1dbca990c9d986b49db9dd2c5fe
-
SHA512
8fbf15373cd1d317b03bb7c284c2935f6f7bf0e0c9aafd0775c3d7bd1b91d4d11e3f1d4fd76b4d4bdc50761a78853728878a354d496c8e873bca4254dddb32fa
-
SSDEEP
1536:zG1U4xiIXaXliA/wRYRuPbxjSDFIinKU1sE2hE3gGV09bN1jhZhqyy0mXpVMGl:UUgP8PwO4ZShHxArjLu0msGl
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5