General
-
Target
605cca9676d75e408ff6dbfd78f9d2cf41f1685e48a12bd5e9ccd6ba75d3a23c
-
Size
120KB
-
Sample
250306-dhdt8axkt9
-
MD5
d7c1f4613b34c0aef89e07337ce0e3a6
-
SHA1
08b5b367442056a9ccc11a5d4ee1e6b18cb38a85
-
SHA256
605cca9676d75e408ff6dbfd78f9d2cf41f1685e48a12bd5e9ccd6ba75d3a23c
-
SHA512
9159d3ceda24f5e5f74c92405ee8d1d58b3863b6f5900d970ce9dd928f48639ce370e0232fff478548ee4214f778c5a824aabac5d18f9261fe12797791a28932
-
SSDEEP
1536:0hOcAoMGbnHGLEhVRcLpnKGsajI165jg/bpCahblGi1AbEIVfEgmzQRC0:0hOc/MmHGLuVWds6cDloi1MvFgQJ
Static task
static1
Behavioral task
behavioral1
Sample
605cca9676d75e408ff6dbfd78f9d2cf41f1685e48a12bd5e9ccd6ba75d3a23c.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
605cca9676d75e408ff6dbfd78f9d2cf41f1685e48a12bd5e9ccd6ba75d3a23c
-
Size
120KB
-
MD5
d7c1f4613b34c0aef89e07337ce0e3a6
-
SHA1
08b5b367442056a9ccc11a5d4ee1e6b18cb38a85
-
SHA256
605cca9676d75e408ff6dbfd78f9d2cf41f1685e48a12bd5e9ccd6ba75d3a23c
-
SHA512
9159d3ceda24f5e5f74c92405ee8d1d58b3863b6f5900d970ce9dd928f48639ce370e0232fff478548ee4214f778c5a824aabac5d18f9261fe12797791a28932
-
SSDEEP
1536:0hOcAoMGbnHGLEhVRcLpnKGsajI165jg/bpCahblGi1AbEIVfEgmzQRC0:0hOc/MmHGLuVWds6cDloi1MvFgQJ
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5