General
-
Target
ebc59723b863c38eb6c05b45d4cd07ef181a92ae8940dc2d20da3043af226010.exe
-
Size
120KB
-
Sample
241120-3sbkaawbkc
-
MD5
0a2977c74dc9f5670c8d97fb8f099d02
-
SHA1
7472fbfa249ab56476aad9b94767a7ee30d34bb7
-
SHA256
ebc59723b863c38eb6c05b45d4cd07ef181a92ae8940dc2d20da3043af226010
-
SHA512
c0969812bc983731acbe7d2266034135142986380a56c496f9d77a2db2671cc150de3197c1746a4d64c584e3f419de7ce044109e87e2445c5d6beece2b3f4c3b
-
SSDEEP
1536:SB04oz0EM99/B4BkvGGJVwttxPPYg/Wj+WIvXfGEhHmZbnD91y7lLWvqWVemFjW1:S1cRM99/B/G+CtGw3GQmZXwlLWv8+W1
Static task
static1
Behavioral task
behavioral1
Sample
ebc59723b863c38eb6c05b45d4cd07ef181a92ae8940dc2d20da3043af226010.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ebc59723b863c38eb6c05b45d4cd07ef181a92ae8940dc2d20da3043af226010.exe
-
Size
120KB
-
MD5
0a2977c74dc9f5670c8d97fb8f099d02
-
SHA1
7472fbfa249ab56476aad9b94767a7ee30d34bb7
-
SHA256
ebc59723b863c38eb6c05b45d4cd07ef181a92ae8940dc2d20da3043af226010
-
SHA512
c0969812bc983731acbe7d2266034135142986380a56c496f9d77a2db2671cc150de3197c1746a4d64c584e3f419de7ce044109e87e2445c5d6beece2b3f4c3b
-
SSDEEP
1536:SB04oz0EM99/B4BkvGGJVwttxPPYg/Wj+WIvXfGEhHmZbnD91y7lLWvqWVemFjW1:S1cRM99/B/G+CtGw3GQmZXwlLWv8+W1
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5