General
-
Target
f82ea9cb6578341e8659937fb5e201f3b9f84b3bd41c88c57f69ecbcdbf5b54e
-
Size
120KB
-
Sample
250127-gdlk2stncy
-
MD5
69f978ca6470cdccc31a51dd8dc4b358
-
SHA1
265e84ef747f72c5e45cd50e55c7e67e2a503c44
-
SHA256
f82ea9cb6578341e8659937fb5e201f3b9f84b3bd41c88c57f69ecbcdbf5b54e
-
SHA512
0db8c2efca861fa1e390dc41ce95091943c2c17524bbb6f0ff17b18aacb4f6744e0cd0d5906231250c77d62624a98608b35abde7918b70d760c977c47ce139c1
-
SSDEEP
3072:jqTIPm7sa4EcMkyp3ilEChbuXETniYior9:jY8m7sa4lMN/C9uun7i
Static task
static1
Behavioral task
behavioral1
Sample
f82ea9cb6578341e8659937fb5e201f3b9f84b3bd41c88c57f69ecbcdbf5b54e.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f82ea9cb6578341e8659937fb5e201f3b9f84b3bd41c88c57f69ecbcdbf5b54e
-
Size
120KB
-
MD5
69f978ca6470cdccc31a51dd8dc4b358
-
SHA1
265e84ef747f72c5e45cd50e55c7e67e2a503c44
-
SHA256
f82ea9cb6578341e8659937fb5e201f3b9f84b3bd41c88c57f69ecbcdbf5b54e
-
SHA512
0db8c2efca861fa1e390dc41ce95091943c2c17524bbb6f0ff17b18aacb4f6744e0cd0d5906231250c77d62624a98608b35abde7918b70d760c977c47ce139c1
-
SSDEEP
3072:jqTIPm7sa4EcMkyp3ilEChbuXETniYior9:jY8m7sa4lMN/C9uun7i
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5