General
-
Target
dda4effc9ee8f0e3d963df29a871596de1fd56a6e9f4064856ce79659b6a3ceb
-
Size
120KB
-
Sample
250306-p5bh6azjz8
-
MD5
829fd0b7229a07701d1da61697f63d6e
-
SHA1
4f9e2bc156227ae9626028fb8a4d16dd7f1be18e
-
SHA256
dda4effc9ee8f0e3d963df29a871596de1fd56a6e9f4064856ce79659b6a3ceb
-
SHA512
3b7483d062dd1ee86033a5b1044ec20c1e8cb4515a4d78d94fffa7d3ff690c0cab17cfb587d2853c1c3dd62c29c751e87f28016864adb7f8555075faaafb191a
-
SSDEEP
1536:tk1KacN4BrQjZ3PeeFb5GbiAYZcWi/oEASG41rokP4VxMjuYQSVJxVmfgHhBYefG:qLE3ZxF9LZfqztckP4VxERQsVbBnUQH
Static task
static1
Behavioral task
behavioral1
Sample
dda4effc9ee8f0e3d963df29a871596de1fd56a6e9f4064856ce79659b6a3ceb.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
dda4effc9ee8f0e3d963df29a871596de1fd56a6e9f4064856ce79659b6a3ceb
-
Size
120KB
-
MD5
829fd0b7229a07701d1da61697f63d6e
-
SHA1
4f9e2bc156227ae9626028fb8a4d16dd7f1be18e
-
SHA256
dda4effc9ee8f0e3d963df29a871596de1fd56a6e9f4064856ce79659b6a3ceb
-
SHA512
3b7483d062dd1ee86033a5b1044ec20c1e8cb4515a4d78d94fffa7d3ff690c0cab17cfb587d2853c1c3dd62c29c751e87f28016864adb7f8555075faaafb191a
-
SSDEEP
1536:tk1KacN4BrQjZ3PeeFb5GbiAYZcWi/oEASG41rokP4VxMjuYQSVJxVmfgHhBYefG:qLE3ZxF9LZfqztckP4VxERQsVbBnUQH
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5