General
-
Target
d2d4a45ddec3fdce40a56204d1a263c5895d30a10183f2cc6fd084a883b38c64
-
Size
120KB
-
Sample
250305-mk8l2swvey
-
MD5
4475ffd450d2b1a040f1c8bc97313d7c
-
SHA1
1b2f2935c6394692a6f34bab2c9f51b9824c67e6
-
SHA256
d2d4a45ddec3fdce40a56204d1a263c5895d30a10183f2cc6fd084a883b38c64
-
SHA512
20ffc5d32710df35ffcc375f9dc92e581b465cefe613952954dde137bf3c764770b463fb8ad222f9b53f443944be23b9b5f16bbc2fc3b47f97eb6adf556a14e0
-
SSDEEP
1536:9Pvhp9sjlLmYzZjWtkxf33kgP/gI332mI1XY67k2Aw36wIm2BEfeb:9Pv3GjlLmEW2f30gPI82zXYQ+wK6e
Static task
static1
Behavioral task
behavioral1
Sample
d2d4a45ddec3fdce40a56204d1a263c5895d30a10183f2cc6fd084a883b38c64.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d2d4a45ddec3fdce40a56204d1a263c5895d30a10183f2cc6fd084a883b38c64
-
Size
120KB
-
MD5
4475ffd450d2b1a040f1c8bc97313d7c
-
SHA1
1b2f2935c6394692a6f34bab2c9f51b9824c67e6
-
SHA256
d2d4a45ddec3fdce40a56204d1a263c5895d30a10183f2cc6fd084a883b38c64
-
SHA512
20ffc5d32710df35ffcc375f9dc92e581b465cefe613952954dde137bf3c764770b463fb8ad222f9b53f443944be23b9b5f16bbc2fc3b47f97eb6adf556a14e0
-
SSDEEP
1536:9Pvhp9sjlLmYzZjWtkxf33kgP/gI332mI1XY67k2Aw36wIm2BEfeb:9Pv3GjlLmEW2f30gPI82zXYQ+wK6e
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5