General
-
Target
eb2fcc7fa6cd52235086d536dfead1ed5f4f8b75105c773bc948e6b0cfc71cf7
-
Size
120KB
-
Sample
241216-ey7mxatnfx
-
MD5
3e628f7e7eab42835c4c72ff36a42a22
-
SHA1
af884fd4241439b4b0e824bee5c649f2198c4d26
-
SHA256
eb2fcc7fa6cd52235086d536dfead1ed5f4f8b75105c773bc948e6b0cfc71cf7
-
SHA512
e1d4673165e0cbb17a93b7cfd665d015a8570e4396c12bcb530ec3a1111f7f2b2bcaa13663b14c3ddac734385f8b1839d27193794e3cae289056738cf245ee05
-
SSDEEP
3072:vGfgQSteacMnXMNJpC0oaci9Lb3FEA/r:v8UceEpC0DT
Static task
static1
Behavioral task
behavioral1
Sample
eb2fcc7fa6cd52235086d536dfead1ed5f4f8b75105c773bc948e6b0cfc71cf7.dll
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
eb2fcc7fa6cd52235086d536dfead1ed5f4f8b75105c773bc948e6b0cfc71cf7
-
Size
120KB
-
MD5
3e628f7e7eab42835c4c72ff36a42a22
-
SHA1
af884fd4241439b4b0e824bee5c649f2198c4d26
-
SHA256
eb2fcc7fa6cd52235086d536dfead1ed5f4f8b75105c773bc948e6b0cfc71cf7
-
SHA512
e1d4673165e0cbb17a93b7cfd665d015a8570e4396c12bcb530ec3a1111f7f2b2bcaa13663b14c3ddac734385f8b1839d27193794e3cae289056738cf245ee05
-
SSDEEP
3072:vGfgQSteacMnXMNJpC0oaci9Lb3FEA/r:v8UceEpC0DT
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5