General
-
Target
e7cb606c44fc0a1b236b26501a1168e60901d34e234a5768bf12338d5303d678.exe
-
Size
120KB
-
Sample
241211-fsp2caspgl
-
MD5
f0b2150d07891fdfdef4de67fb7314d7
-
SHA1
8f4bc4cea5955e57dbbc18b3518535ef39c36a68
-
SHA256
e7cb606c44fc0a1b236b26501a1168e60901d34e234a5768bf12338d5303d678
-
SHA512
521c7674f99bca4900f93f7f4e2eeaf78d4d3ee92403103a86b05e7d3b4bba8be05ef3f6bd4df0c8aef15c7c93fee2d192c9e817fe2d1c1d40d3eb747cc70d4c
-
SSDEEP
3072:YFkOYBipsDgIl/R0KEHNRjRkLLB0HKILE0T9BZh6bw:Y+OqipuytRjiZ0Htnngw
Static task
static1
Behavioral task
behavioral1
Sample
e7cb606c44fc0a1b236b26501a1168e60901d34e234a5768bf12338d5303d678.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e7cb606c44fc0a1b236b26501a1168e60901d34e234a5768bf12338d5303d678.exe
-
Size
120KB
-
MD5
f0b2150d07891fdfdef4de67fb7314d7
-
SHA1
8f4bc4cea5955e57dbbc18b3518535ef39c36a68
-
SHA256
e7cb606c44fc0a1b236b26501a1168e60901d34e234a5768bf12338d5303d678
-
SHA512
521c7674f99bca4900f93f7f4e2eeaf78d4d3ee92403103a86b05e7d3b4bba8be05ef3f6bd4df0c8aef15c7c93fee2d192c9e817fe2d1c1d40d3eb747cc70d4c
-
SSDEEP
3072:YFkOYBipsDgIl/R0KEHNRjRkLLB0HKILE0T9BZh6bw:Y+OqipuytRjiZ0Htnngw
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5