General
-
Target
b00a6f54533d105f654b01be82c0ea143ab87d885273646c3fcc257fe28bf214N.exe
-
Size
120KB
-
Sample
250204-2e6b3avrhw
-
MD5
37961cad391b91289d334a15ba6d8540
-
SHA1
6c9f1d11a726fda93859b05d32b548a3462e6392
-
SHA256
b00a6f54533d105f654b01be82c0ea143ab87d885273646c3fcc257fe28bf214
-
SHA512
fe6ce607ff5fb4d62d7f96319bcf6a79f784ed0247f85a4ae07c89775a8c39ba79c9493abdadc9bb3f140754ff75ae790fabed5aa449d5a79d0513f466707d55
-
SSDEEP
1536:TO7wQeKsrk8xDVXvmapHhkr4GYB44929oBN8MDgJx12dga94H2SPAWixBj:cwQe28xhXvZpBkS79aoEMC3K9GPAW
Static task
static1
Behavioral task
behavioral1
Sample
b00a6f54533d105f654b01be82c0ea143ab87d885273646c3fcc257fe28bf214N.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b00a6f54533d105f654b01be82c0ea143ab87d885273646c3fcc257fe28bf214N.exe
-
Size
120KB
-
MD5
37961cad391b91289d334a15ba6d8540
-
SHA1
6c9f1d11a726fda93859b05d32b548a3462e6392
-
SHA256
b00a6f54533d105f654b01be82c0ea143ab87d885273646c3fcc257fe28bf214
-
SHA512
fe6ce607ff5fb4d62d7f96319bcf6a79f784ed0247f85a4ae07c89775a8c39ba79c9493abdadc9bb3f140754ff75ae790fabed5aa449d5a79d0513f466707d55
-
SSDEEP
1536:TO7wQeKsrk8xDVXvmapHhkr4GYB44929oBN8MDgJx12dga94H2SPAWixBj:cwQe28xhXvZpBkS79aoEMC3K9GPAW
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5