General
-
Target
6717725dc4a26b5a822c25a52dcc238dcf8ff2ea84139a365116572b84fb6a4fN.exe
-
Size
120KB
-
Sample
250201-qanqnsvqal
-
MD5
a54829696ae4927232d966f31ce47860
-
SHA1
b152277b24be0e8fba6ac44546071e484cdc0092
-
SHA256
6717725dc4a26b5a822c25a52dcc238dcf8ff2ea84139a365116572b84fb6a4f
-
SHA512
7438aac9fbd158d6421026ecf626d5047578ea8329b0fc4f45bc7ef183be693084c21df633445d3d1d6998a9c3a1a9a4bb28fefdfab4c0b79be083191d11e907
-
SSDEEP
1536:p3svEzuYfaX3/BAd4rXdHd9NOEbM8CB/p4X5DkHJhrAj5HGsXxd1lPxxR4X5jKbH:46inhXlzNOJpyX54HTG5ms1lPxx6It
Static task
static1
Behavioral task
behavioral1
Sample
6717725dc4a26b5a822c25a52dcc238dcf8ff2ea84139a365116572b84fb6a4fN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6717725dc4a26b5a822c25a52dcc238dcf8ff2ea84139a365116572b84fb6a4fN.exe
-
Size
120KB
-
MD5
a54829696ae4927232d966f31ce47860
-
SHA1
b152277b24be0e8fba6ac44546071e484cdc0092
-
SHA256
6717725dc4a26b5a822c25a52dcc238dcf8ff2ea84139a365116572b84fb6a4f
-
SHA512
7438aac9fbd158d6421026ecf626d5047578ea8329b0fc4f45bc7ef183be693084c21df633445d3d1d6998a9c3a1a9a4bb28fefdfab4c0b79be083191d11e907
-
SSDEEP
1536:p3svEzuYfaX3/BAd4rXdHd9NOEbM8CB/p4X5DkHJhrAj5HGsXxd1lPxxR4X5jKbH:46inhXlzNOJpyX54HTG5ms1lPxx6It
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5