General
-
Target
1bf6cfff1d584b78f6f9a78ae6f7e08fdc922589f8e3d928a0d8b7ce952dadec
-
Size
120KB
-
Sample
250126-y4mdpstlfq
-
MD5
c4265e923c625b59a49f5200e8bb8763
-
SHA1
0adf295fcc1af6c4a0830a1c7fd6f9cf9ab7c73e
-
SHA256
1bf6cfff1d584b78f6f9a78ae6f7e08fdc922589f8e3d928a0d8b7ce952dadec
-
SHA512
76180ce690c84604e1a4b7193bd36ec23f095cd7bc068a45c56cda923c4f0bc44bdbf21b62385d61b7d4874278de29e8d6c063ae2f4d23563a6db3298186f104
-
SSDEEP
1536:qXHYUs/ldid8BipQhi23OzYvzklj9GStAXoNDc+deOWvOskLZXM6TDBIaaH:E4l88BiGhiPz6m9nNDanpkLZBBvW
Static task
static1
Behavioral task
behavioral1
Sample
1bf6cfff1d584b78f6f9a78ae6f7e08fdc922589f8e3d928a0d8b7ce952dadec.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1bf6cfff1d584b78f6f9a78ae6f7e08fdc922589f8e3d928a0d8b7ce952dadec
-
Size
120KB
-
MD5
c4265e923c625b59a49f5200e8bb8763
-
SHA1
0adf295fcc1af6c4a0830a1c7fd6f9cf9ab7c73e
-
SHA256
1bf6cfff1d584b78f6f9a78ae6f7e08fdc922589f8e3d928a0d8b7ce952dadec
-
SHA512
76180ce690c84604e1a4b7193bd36ec23f095cd7bc068a45c56cda923c4f0bc44bdbf21b62385d61b7d4874278de29e8d6c063ae2f4d23563a6db3298186f104
-
SSDEEP
1536:qXHYUs/ldid8BipQhi23OzYvzklj9GStAXoNDc+deOWvOskLZXM6TDBIaaH:E4l88BiGhiPz6m9nNDanpkLZBBvW
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5