General
-
Target
85123aadd0f97f4d2f0bde82d26375fa625db2baf454f6b31ee6beed132c2987N.exe
-
Size
120KB
-
Sample
250204-zzeczasmey
-
MD5
03478df292a8f817dc507d0094e88ad0
-
SHA1
1f8abc230ef843caf7e72416100bb8d89f03e89e
-
SHA256
85123aadd0f97f4d2f0bde82d26375fa625db2baf454f6b31ee6beed132c2987
-
SHA512
6600ec8fefb5f000ffbe302979dabea7b0987df5fac89d820ac7feffc435e5b2df24926e489b9aef38f6bfb800f28a2e458ef1e6d950eff226ebaf9a49ed456c
-
SSDEEP
1536:maaU1tmK9RO7EV/T0/yvqrCLzai1gOKiG/J7EW7Jz0Bs+yN/Eu6m2K2pm+/Q3D:SMg8/TOyvqr2JFG/Blcs+yNtomKQ3D
Static task
static1
Behavioral task
behavioral1
Sample
85123aadd0f97f4d2f0bde82d26375fa625db2baf454f6b31ee6beed132c2987N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
85123aadd0f97f4d2f0bde82d26375fa625db2baf454f6b31ee6beed132c2987N.exe
-
Size
120KB
-
MD5
03478df292a8f817dc507d0094e88ad0
-
SHA1
1f8abc230ef843caf7e72416100bb8d89f03e89e
-
SHA256
85123aadd0f97f4d2f0bde82d26375fa625db2baf454f6b31ee6beed132c2987
-
SHA512
6600ec8fefb5f000ffbe302979dabea7b0987df5fac89d820ac7feffc435e5b2df24926e489b9aef38f6bfb800f28a2e458ef1e6d950eff226ebaf9a49ed456c
-
SSDEEP
1536:maaU1tmK9RO7EV/T0/yvqrCLzai1gOKiG/J7EW7Jz0Bs+yN/Eu6m2K2pm+/Q3D:SMg8/TOyvqr2JFG/Blcs+yNtomKQ3D
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5