General
-
Target
7c7221d326df872dc6d500f21da8828d0338d9c584480e014f2fe70c63e40e1e
-
Size
120KB
-
Sample
241230-arm8ga1qgk
-
MD5
f89ffc775d260773aac4a1397e7bcf91
-
SHA1
3332a0752dea9b9cc128d2cd50ae58addd4cd6fd
-
SHA256
7c7221d326df872dc6d500f21da8828d0338d9c584480e014f2fe70c63e40e1e
-
SHA512
0a1313eb26e714f9949b1430b26fafe8b4cddfd50f18a27bbb8d0c632b0e1d854608b2117aec3949961733e2b5c553cb85ae43ff3f69bc7110ff9e3ee7f51bb5
-
SSDEEP
1536:KerTQ1g4waRq9t6qAiPTwD5mrjiFHT3IXf+8yP81YkjFkUMRzOuNgx/PvE092q4w:C1jRq9giPMDqOF2f+8y8UBgZ2dw
Static task
static1
Behavioral task
behavioral1
Sample
7c7221d326df872dc6d500f21da8828d0338d9c584480e014f2fe70c63e40e1e.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7c7221d326df872dc6d500f21da8828d0338d9c584480e014f2fe70c63e40e1e
-
Size
120KB
-
MD5
f89ffc775d260773aac4a1397e7bcf91
-
SHA1
3332a0752dea9b9cc128d2cd50ae58addd4cd6fd
-
SHA256
7c7221d326df872dc6d500f21da8828d0338d9c584480e014f2fe70c63e40e1e
-
SHA512
0a1313eb26e714f9949b1430b26fafe8b4cddfd50f18a27bbb8d0c632b0e1d854608b2117aec3949961733e2b5c553cb85ae43ff3f69bc7110ff9e3ee7f51bb5
-
SSDEEP
1536:KerTQ1g4waRq9t6qAiPTwD5mrjiFHT3IXf+8yP81YkjFkUMRzOuNgx/PvE092q4w:C1jRq9giPMDqOF2f+8y8UBgZ2dw
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5