General
-
Target
155738cb19add2654c6d3fff1190fb372145a1c4c8c9ab3ffd204a6cc13484ba
-
Size
120KB
-
Sample
241230-yqgw3aypbv
-
MD5
d42ccb63a29c50719ea1f60e898c8284
-
SHA1
4e9971be1042ce23bde196456485339855a4203f
-
SHA256
155738cb19add2654c6d3fff1190fb372145a1c4c8c9ab3ffd204a6cc13484ba
-
SHA512
fdc50dc4dc13ab81d9f187402087e49cb79ac29dc3f3439e3d6734b9c91d3ccfc5e02f73e5cbaf1cf130a01c5ef5849d4ea7587408af45cf70675e701774695c
-
SSDEEP
3072:5pUT8LXnzplC0/EY9dTkNJWf7HeO9pm6:jVLXLskTew
Static task
static1
Behavioral task
behavioral1
Sample
155738cb19add2654c6d3fff1190fb372145a1c4c8c9ab3ffd204a6cc13484ba.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
155738cb19add2654c6d3fff1190fb372145a1c4c8c9ab3ffd204a6cc13484ba
-
Size
120KB
-
MD5
d42ccb63a29c50719ea1f60e898c8284
-
SHA1
4e9971be1042ce23bde196456485339855a4203f
-
SHA256
155738cb19add2654c6d3fff1190fb372145a1c4c8c9ab3ffd204a6cc13484ba
-
SHA512
fdc50dc4dc13ab81d9f187402087e49cb79ac29dc3f3439e3d6734b9c91d3ccfc5e02f73e5cbaf1cf130a01c5ef5849d4ea7587408af45cf70675e701774695c
-
SSDEEP
3072:5pUT8LXnzplC0/EY9dTkNJWf7HeO9pm6:jVLXLskTew
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5