General
-
Target
ecce4ca71867832c435c7e8c15b353beaf937f256be58bc7881aeb2ffd0fffe6.exe
-
Size
120KB
-
Sample
241207-lgnxssskfq
-
MD5
9387d4c33268f67cb6994f3aae5dcd20
-
SHA1
cfb23163138205b465006625f2bf7d5874430afa
-
SHA256
ecce4ca71867832c435c7e8c15b353beaf937f256be58bc7881aeb2ffd0fffe6
-
SHA512
75611217386056ce97c3a0a22b3c6fd6e29d978880bae73622705be5370cd5a0897455bb7f614d0d9d2d8494aeab6ce64267944d43cc5b1626d1feb478d8c586
-
SSDEEP
1536:1NDpJwXf4+dU5ia8IsBwen/OoerqVkCNrXKWk7Z4BH2dXXbnhRVFtfBKndnri0nl:TrwXf4TgVqe/NHiCp6W0S92FLnNTSPS6
Static task
static1
Behavioral task
behavioral1
Sample
ecce4ca71867832c435c7e8c15b353beaf937f256be58bc7881aeb2ffd0fffe6.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ecce4ca71867832c435c7e8c15b353beaf937f256be58bc7881aeb2ffd0fffe6.exe
-
Size
120KB
-
MD5
9387d4c33268f67cb6994f3aae5dcd20
-
SHA1
cfb23163138205b465006625f2bf7d5874430afa
-
SHA256
ecce4ca71867832c435c7e8c15b353beaf937f256be58bc7881aeb2ffd0fffe6
-
SHA512
75611217386056ce97c3a0a22b3c6fd6e29d978880bae73622705be5370cd5a0897455bb7f614d0d9d2d8494aeab6ce64267944d43cc5b1626d1feb478d8c586
-
SSDEEP
1536:1NDpJwXf4+dU5ia8IsBwen/OoerqVkCNrXKWk7Z4BH2dXXbnhRVFtfBKndnri0nl:TrwXf4TgVqe/NHiCp6W0S92FLnNTSPS6
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5