General
-
Target
67a3f79a85c8966f34af93c54a5dc5311191200148dc0df9b05ef47d1675769dN.exe
-
Size
120KB
-
Sample
250208-j1pbkavran
-
MD5
b0885a90dd3fbea7007e9bac7b841300
-
SHA1
2f178224464ab324aef7b08f095724fffe9c7b5b
-
SHA256
67a3f79a85c8966f34af93c54a5dc5311191200148dc0df9b05ef47d1675769d
-
SHA512
7d4527e96eeeb371472de642b9cd1a990098093e42a510388718134352cccfb53407a5b4914e2e733a7cea05b60e0b13b0ebc41883110e00bf9efc2a722c2220
-
SSDEEP
3072:fbOrfGG2/SoDkEtEDzIrVnKQtmjbRLftlvph8jWTgW:fbO7o6iroMNtObltl7IWT
Static task
static1
Behavioral task
behavioral1
Sample
67a3f79a85c8966f34af93c54a5dc5311191200148dc0df9b05ef47d1675769dN.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
67a3f79a85c8966f34af93c54a5dc5311191200148dc0df9b05ef47d1675769dN.exe
-
Size
120KB
-
MD5
b0885a90dd3fbea7007e9bac7b841300
-
SHA1
2f178224464ab324aef7b08f095724fffe9c7b5b
-
SHA256
67a3f79a85c8966f34af93c54a5dc5311191200148dc0df9b05ef47d1675769d
-
SHA512
7d4527e96eeeb371472de642b9cd1a990098093e42a510388718134352cccfb53407a5b4914e2e733a7cea05b60e0b13b0ebc41883110e00bf9efc2a722c2220
-
SSDEEP
3072:fbOrfGG2/SoDkEtEDzIrVnKQtmjbRLftlvph8jWTgW:fbO7o6iroMNtObltl7IWT
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5