General
-
Target
c37ae5d1f41dbadb46e53099d1bca878a6c1065ffb17424fd77e8835842e7224
-
Size
120KB
-
Sample
250127-d22qdszkbn
-
MD5
820ba8e108d99e1821c07d09aa1564da
-
SHA1
50e287d995f0f0174bc4e58453304318b9d65a2d
-
SHA256
c37ae5d1f41dbadb46e53099d1bca878a6c1065ffb17424fd77e8835842e7224
-
SHA512
87fca18ea00b286ccfc5aed58e97df99533ff3f55a79239ff8496f46683fc1d4afc91543a32fd32b8e0a6edaa4c0bb56061e63585684df836879d23451e19889
-
SSDEEP
3072:bkFeojNP/qKNWqFL4rbhPXuAKA1TqExyrfXS:YFZ/qKNWM4nhGXeqExgS
Static task
static1
Behavioral task
behavioral1
Sample
c37ae5d1f41dbadb46e53099d1bca878a6c1065ffb17424fd77e8835842e7224.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c37ae5d1f41dbadb46e53099d1bca878a6c1065ffb17424fd77e8835842e7224
-
Size
120KB
-
MD5
820ba8e108d99e1821c07d09aa1564da
-
SHA1
50e287d995f0f0174bc4e58453304318b9d65a2d
-
SHA256
c37ae5d1f41dbadb46e53099d1bca878a6c1065ffb17424fd77e8835842e7224
-
SHA512
87fca18ea00b286ccfc5aed58e97df99533ff3f55a79239ff8496f46683fc1d4afc91543a32fd32b8e0a6edaa4c0bb56061e63585684df836879d23451e19889
-
SSDEEP
3072:bkFeojNP/qKNWqFL4rbhPXuAKA1TqExyrfXS:YFZ/qKNWM4nhGXeqExgS
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5