General
-
Target
6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37aN.exe
-
Size
120KB
-
Sample
241230-12bwas1lfm
-
MD5
6010ca3b8473a728e365657c8151b320
-
SHA1
d64564dd75a68847c1ea9f3b63f08e22e6cfd02f
-
SHA256
6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37a
-
SHA512
3b763fddf1fe0247e7be7644bba30998cca3db19403274a493e694a008883d609df3b7aa7b3497a2ea1323458f6c5944e6bafbda2c699771ad45b5498960e31c
-
SSDEEP
1536:BJMmGWYxWpRz9wF5Yp6zGYZFl8FVJtiomoRRbvbmYv/NiZLrKRVsnsgsf9SWo:BJ4yWsIiYt8Comovbvb7HUxKv/x9O
Static task
static1
Behavioral task
behavioral1
Sample
6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37aN.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37aN.exe
-
Size
120KB
-
MD5
6010ca3b8473a728e365657c8151b320
-
SHA1
d64564dd75a68847c1ea9f3b63f08e22e6cfd02f
-
SHA256
6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37a
-
SHA512
3b763fddf1fe0247e7be7644bba30998cca3db19403274a493e694a008883d609df3b7aa7b3497a2ea1323458f6c5944e6bafbda2c699771ad45b5498960e31c
-
SSDEEP
1536:BJMmGWYxWpRz9wF5Yp6zGYZFl8FVJtiomoRRbvbmYv/NiZLrKRVsnsgsf9SWo:BJ4yWsIiYt8Comovbvb7HUxKv/x9O
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5