General
-
Target
cbc0ccb75adcebb0283553e847a6c66173da679a361a57304b1d5ea9fc72c251
-
Size
3.0MB
-
Sample
250203-fyq6latjfm
-
MD5
08d4469b5570f527198b54120b0cb918
-
SHA1
454841dbcd81868c42c0b9e3de3c17d680b347e6
-
SHA256
cbc0ccb75adcebb0283553e847a6c66173da679a361a57304b1d5ea9fc72c251
-
SHA512
8f0aac48cbed026c7eae17025696f899c62d2b19e82b2021d21706de726df1ec331958bff121453b474f98917701530b10a356fa704102c27a60351983ec9b96
-
SSDEEP
49152:SS6sAL7ftzbI8k5/Jzt7eXGPRQV4W6tmsaiQhd2tgaxiNQpyRRHfE1hRckPI:SSxCrtzbFkHNp2x6tUhyga1SRHfEpVI
Static task
static1
Behavioral task
behavioral1
Sample
cbc0ccb75adcebb0283553e847a6c66173da679a361a57304b1d5ea9fc72c251.exe
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cbc0ccb75adcebb0283553e847a6c66173da679a361a57304b1d5ea9fc72c251
-
Size
3.0MB
-
MD5
08d4469b5570f527198b54120b0cb918
-
SHA1
454841dbcd81868c42c0b9e3de3c17d680b347e6
-
SHA256
cbc0ccb75adcebb0283553e847a6c66173da679a361a57304b1d5ea9fc72c251
-
SHA512
8f0aac48cbed026c7eae17025696f899c62d2b19e82b2021d21706de726df1ec331958bff121453b474f98917701530b10a356fa704102c27a60351983ec9b96
-
SSDEEP
49152:SS6sAL7ftzbI8k5/Jzt7eXGPRQV4W6tmsaiQhd2tgaxiNQpyRRHfE1hRckPI:SSxCrtzbFkHNp2x6tUhyga1SRHfEpVI
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5