General
-
Target
cd784c1b6c25c7f350a0ca90a56688b9ed7b24286b149aac5f46b1afa3556392
-
Size
120KB
-
Sample
250208-e8h3asxkan
-
MD5
37128b51773ad5fdf18d869dbfc8cde3
-
SHA1
056852825c736a8805cb5b8d3fe53f5f9517e97d
-
SHA256
cd784c1b6c25c7f350a0ca90a56688b9ed7b24286b149aac5f46b1afa3556392
-
SHA512
992deeef9fca2a4fc5d1ac03e68dd56d924683ede80f308463fcf79cb1e458593e8a7a058983e079eb37867c2897c65f6aab7315b990f4bd3deb4d9be7bbcc0d
-
SSDEEP
3072:ulYeETe8dGRrSQqpcMSiVXwyejynJi23pLZ5n8:uld8e8dGZj38XwTj0zLfn
Static task
static1
Behavioral task
behavioral1
Sample
cd784c1b6c25c7f350a0ca90a56688b9ed7b24286b149aac5f46b1afa3556392.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cd784c1b6c25c7f350a0ca90a56688b9ed7b24286b149aac5f46b1afa3556392
-
Size
120KB
-
MD5
37128b51773ad5fdf18d869dbfc8cde3
-
SHA1
056852825c736a8805cb5b8d3fe53f5f9517e97d
-
SHA256
cd784c1b6c25c7f350a0ca90a56688b9ed7b24286b149aac5f46b1afa3556392
-
SHA512
992deeef9fca2a4fc5d1ac03e68dd56d924683ede80f308463fcf79cb1e458593e8a7a058983e079eb37867c2897c65f6aab7315b990f4bd3deb4d9be7bbcc0d
-
SSDEEP
3072:ulYeETe8dGRrSQqpcMSiVXwyejynJi23pLZ5n8:uld8e8dGZj38XwTj0zLfn
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5