General
-
Target
4cb176ae9f64ce1acde8b08ef87961b772755aaa0c576577dba3e722359c2c08
-
Size
120KB
-
Sample
250126-18a8caxphn
-
MD5
99d3d1d12137a80e427e3c638138b249
-
SHA1
526cc3b64e4302cec7a185d3895950b9e74c65c8
-
SHA256
4cb176ae9f64ce1acde8b08ef87961b772755aaa0c576577dba3e722359c2c08
-
SHA512
1c76be9fd186b20eb28ce3851ffce488496eea70693a9709b1b3ac73865c53549fb8b1dce1b1bd30f5026d80993d7b6c3397f2c513fcd5e6fafe4440a3c0e242
-
SSDEEP
1536:aDzX5fkdb7kFgJ3PzewikMbcpO7d0zSO561z5sMY3NrqEsJyMAVIIajDv8HIY+r5:aDloQFIPzj4Jd056LYdufJyUjD7rBf
Static task
static1
Behavioral task
behavioral1
Sample
4cb176ae9f64ce1acde8b08ef87961b772755aaa0c576577dba3e722359c2c08.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4cb176ae9f64ce1acde8b08ef87961b772755aaa0c576577dba3e722359c2c08
-
Size
120KB
-
MD5
99d3d1d12137a80e427e3c638138b249
-
SHA1
526cc3b64e4302cec7a185d3895950b9e74c65c8
-
SHA256
4cb176ae9f64ce1acde8b08ef87961b772755aaa0c576577dba3e722359c2c08
-
SHA512
1c76be9fd186b20eb28ce3851ffce488496eea70693a9709b1b3ac73865c53549fb8b1dce1b1bd30f5026d80993d7b6c3397f2c513fcd5e6fafe4440a3c0e242
-
SSDEEP
1536:aDzX5fkdb7kFgJ3PzewikMbcpO7d0zSO561z5sMY3NrqEsJyMAVIIajDv8HIY+r5:aDloQFIPzj4Jd056LYdufJyUjD7rBf
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5