General
-
Target
a6f8fcdf08d47637cc2151fc5888d9c5643ff6ffda647d7559c5d37e1aacccb5
-
Size
120KB
-
Sample
250101-b3t1tszlcx
-
MD5
eb613ca57258709512eb1b147f253047
-
SHA1
edf7e064c1f753a4913f2ef3622f4fb8b4aceb80
-
SHA256
a6f8fcdf08d47637cc2151fc5888d9c5643ff6ffda647d7559c5d37e1aacccb5
-
SHA512
344f030b582f111f3b060eff86e15beffcf5c60b766ef3653c1cea9f3e3e28cfdc96aade73fb9f0fcd58a35af7d09911f89d53064ee57a4bd7690c66a0e0d31f
-
SSDEEP
3072:Ak2LhALW38jLP/SlieYjXN+BlQIadxUNT:p2FAB2l0h+oR
Static task
static1
Behavioral task
behavioral1
Sample
a6f8fcdf08d47637cc2151fc5888d9c5643ff6ffda647d7559c5d37e1aacccb5.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a6f8fcdf08d47637cc2151fc5888d9c5643ff6ffda647d7559c5d37e1aacccb5
-
Size
120KB
-
MD5
eb613ca57258709512eb1b147f253047
-
SHA1
edf7e064c1f753a4913f2ef3622f4fb8b4aceb80
-
SHA256
a6f8fcdf08d47637cc2151fc5888d9c5643ff6ffda647d7559c5d37e1aacccb5
-
SHA512
344f030b582f111f3b060eff86e15beffcf5c60b766ef3653c1cea9f3e3e28cfdc96aade73fb9f0fcd58a35af7d09911f89d53064ee57a4bd7690c66a0e0d31f
-
SSDEEP
3072:Ak2LhALW38jLP/SlieYjXN+BlQIadxUNT:p2FAB2l0h+oR
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5