General
-
Target
23745e0d83ba4329b7e29bcf691150cd223625acdba3a8464f29cdc1d86e4dcc
-
Size
120KB
-
Sample
241231-y67sesxngz
-
MD5
e751947f1cc4c44cfbe30351f1e88ab6
-
SHA1
acbb382a6bfe409cf11905193433e80934dce53f
-
SHA256
23745e0d83ba4329b7e29bcf691150cd223625acdba3a8464f29cdc1d86e4dcc
-
SHA512
a34f33c6cd223145fb723d18115ada4980a2842cc85b4f2c996de280ac2db741a384a226a425f56b21f2ccc1800cf4c4d97485bfdd879935885f9fe9ccf8ac9d
-
SSDEEP
3072:I0ih6tvRfkxpQAyb1l/41e2epBeLTtg0hBuAxj5n:ILyvl4pQAybr417epBqlhBT5n
Static task
static1
Behavioral task
behavioral1
Sample
23745e0d83ba4329b7e29bcf691150cd223625acdba3a8464f29cdc1d86e4dcc.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
23745e0d83ba4329b7e29bcf691150cd223625acdba3a8464f29cdc1d86e4dcc
-
Size
120KB
-
MD5
e751947f1cc4c44cfbe30351f1e88ab6
-
SHA1
acbb382a6bfe409cf11905193433e80934dce53f
-
SHA256
23745e0d83ba4329b7e29bcf691150cd223625acdba3a8464f29cdc1d86e4dcc
-
SHA512
a34f33c6cd223145fb723d18115ada4980a2842cc85b4f2c996de280ac2db741a384a226a425f56b21f2ccc1800cf4c4d97485bfdd879935885f9fe9ccf8ac9d
-
SSDEEP
3072:I0ih6tvRfkxpQAyb1l/41e2epBeLTtg0hBuAxj5n:ILyvl4pQAybr417epBqlhBT5n
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5