General
-
Target
8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87
-
Size
120KB
-
Sample
250101-a13phsxqe1
-
MD5
aa9c8935b98c0fe6f840c94d110bbcee
-
SHA1
2c973b90f87688c3183c74394b29ea10c6ccf7b2
-
SHA256
8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87
-
SHA512
39597f4375af2a5f5232bbb65bb84fada6fa01d3762df397a480340497469ea5bf5c0fd021b2895226fa53ce83871f05ff696c565437efdc8b011ccf2bc35745
-
SSDEEP
3072:Grx8Jy/gxY37GXWMs4LPZCdEpVHsO1UD6qCbjHG9:Grx6y/trGXWMs4LIduMO1u6q39
Static task
static1
Behavioral task
behavioral1
Sample
8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87
-
Size
120KB
-
MD5
aa9c8935b98c0fe6f840c94d110bbcee
-
SHA1
2c973b90f87688c3183c74394b29ea10c6ccf7b2
-
SHA256
8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87
-
SHA512
39597f4375af2a5f5232bbb65bb84fada6fa01d3762df397a480340497469ea5bf5c0fd021b2895226fa53ce83871f05ff696c565437efdc8b011ccf2bc35745
-
SSDEEP
3072:Grx8Jy/gxY37GXWMs4LPZCdEpVHsO1UD6qCbjHG9:Grx6y/trGXWMs4LIduMO1u6q39
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5