General
-
Target
ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455N.exe
-
Size
120KB
-
Sample
241216-wxg5asxqal
-
MD5
2e2cd0f76ecc931217e27fd4526f1d50
-
SHA1
e66fa05267a769e72bc97bbe3ca96c6a7a748be8
-
SHA256
ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455
-
SHA512
30833205e3c2d345722aa5d37f0433d8471cbec3c6b75177511a6952e9e911d8c5b56a070af133230db0c6ed6519095d191e98f8890f9cf21130f4b77ec8aabe
-
SSDEEP
1536:tpQMaAyoiSc3YNMy1Un1yy+cW0T4sWkUeBS/gqWHwQXx0KURjNDShTDjSItuOfdz:tSpW41J+UT4sW4SQHdURYTiuuAd3d1
Static task
static1
Behavioral task
behavioral1
Sample
ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455N.exe
-
Size
120KB
-
MD5
2e2cd0f76ecc931217e27fd4526f1d50
-
SHA1
e66fa05267a769e72bc97bbe3ca96c6a7a748be8
-
SHA256
ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455
-
SHA512
30833205e3c2d345722aa5d37f0433d8471cbec3c6b75177511a6952e9e911d8c5b56a070af133230db0c6ed6519095d191e98f8890f9cf21130f4b77ec8aabe
-
SSDEEP
1536:tpQMaAyoiSc3YNMy1Un1yy+cW0T4sWkUeBS/gqWHwQXx0KURjNDShTDjSItuOfdz:tSpW41J+UT4sW4SQHdURYTiuuAd3d1
-
Modifies firewall policy service
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5