General
-
Target
ec293d93758a1ab99f8041ba1a6539960c2ee2e43075f4b82a052950ee89710b
-
Size
120KB
-
Sample
241206-egkf2syncx
-
MD5
352a52f611e3a5865385328134ac4c75
-
SHA1
f8d7186045f11c14ec57ace4e6405a09c5a47ac1
-
SHA256
ec293d93758a1ab99f8041ba1a6539960c2ee2e43075f4b82a052950ee89710b
-
SHA512
44b8c4f539628cabbf600e20e40c69efd1a14a87fcf3731ca4e09a7ea37c7f51cee3a34fbe6e3463d1940acc208df51632f58d93d25040d60e99f8c8efacd567
-
SSDEEP
3072:C9OepIjiltian1r2obJ5c8BoWeGS1fDnWdqiwrDyW9:CzQYtNB2oE89S1fDnWdqHDX
Static task
static1
Behavioral task
behavioral1
Sample
ec293d93758a1ab99f8041ba1a6539960c2ee2e43075f4b82a052950ee89710b.dll
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ec293d93758a1ab99f8041ba1a6539960c2ee2e43075f4b82a052950ee89710b
-
Size
120KB
-
MD5
352a52f611e3a5865385328134ac4c75
-
SHA1
f8d7186045f11c14ec57ace4e6405a09c5a47ac1
-
SHA256
ec293d93758a1ab99f8041ba1a6539960c2ee2e43075f4b82a052950ee89710b
-
SHA512
44b8c4f539628cabbf600e20e40c69efd1a14a87fcf3731ca4e09a7ea37c7f51cee3a34fbe6e3463d1940acc208df51632f58d93d25040d60e99f8c8efacd567
-
SSDEEP
3072:C9OepIjiltian1r2obJ5c8BoWeGS1fDnWdqiwrDyW9:CzQYtNB2oE89S1fDnWdqHDX
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5