General
-
Target
ecbb1a2222083d460cdb410873df426147b09ae0a9835c38b9bec66c2b69cff7.exe
-
Size
1.1MB
-
Sample
241206-tdbgas1lbr
-
MD5
8f74183c64bb7de8f03478a2db645f18
-
SHA1
12c1290149bf45050a8a784261c36a19227b264f
-
SHA256
ecbb1a2222083d460cdb410873df426147b09ae0a9835c38b9bec66c2b69cff7
-
SHA512
c00bb4d8eebc10f213ae7819aea756475f090b69b4ce3f233b6b357cb141e46dcc113799c4eb47d78280449172b0e9f765304f616d6be7b9047d63656a99b3ab
-
SSDEEP
24576:dUW98hBIkJSRTOkVUz7bBAFuUWBxDaoFryHqhHa5:dUWMBIkRkaziEUaPFryHqk5
Static task
static1
Behavioral task
behavioral1
Sample
ecbb1a2222083d460cdb410873df426147b09ae0a9835c38b9bec66c2b69cff7.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
ecbb1a2222083d460cdb410873df426147b09ae0a9835c38b9bec66c2b69cff7.exe
-
Size
1.1MB
-
MD5
8f74183c64bb7de8f03478a2db645f18
-
SHA1
12c1290149bf45050a8a784261c36a19227b264f
-
SHA256
ecbb1a2222083d460cdb410873df426147b09ae0a9835c38b9bec66c2b69cff7
-
SHA512
c00bb4d8eebc10f213ae7819aea756475f090b69b4ce3f233b6b357cb141e46dcc113799c4eb47d78280449172b0e9f765304f616d6be7b9047d63656a99b3ab
-
SSDEEP
24576:dUW98hBIkJSRTOkVUz7bBAFuUWBxDaoFryHqhHa5:dUWMBIkRkaziEUaPFryHqk5
-
Modifies firewall policy service
-
Sality family
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5