General
-
Target
2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558
-
Size
4.9MB
-
Sample
230903-w9mwbabd9v
-
MD5
ca42923db507cd1ddc781561e6009cfc
-
SHA1
05619295033c8df5f24e71a2924e6d5a60a3fbf4
-
SHA256
2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558
-
SHA512
83b93eedefc7b980a025f73050398e01ce116f84a020469d5e9c791d913a4db973d67498fdf2ea01242c66a1ad810b0bf25854f8178e61ab80dbbcedab40e4a2
-
SSDEEP
98304:X2ONi+29K/WE9PhBGjohAInvqIKofZP5UyeAQQm4OTb12pcFS+fRXN/f0ykSJf+h:X4+SK9hh4M5v9fZP5UNDcOnMp0xN/8dJ
Behavioral task
behavioral1
Sample
2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558.exe
Resource
win7-20230831-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558
-
Size
4.9MB
-
MD5
ca42923db507cd1ddc781561e6009cfc
-
SHA1
05619295033c8df5f24e71a2924e6d5a60a3fbf4
-
SHA256
2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558
-
SHA512
83b93eedefc7b980a025f73050398e01ce116f84a020469d5e9c791d913a4db973d67498fdf2ea01242c66a1ad810b0bf25854f8178e61ab80dbbcedab40e4a2
-
SSDEEP
98304:X2ONi+29K/WE9PhBGjohAInvqIKofZP5UyeAQQm4OTb12pcFS+fRXN/f0ykSJf+h:X4+SK9hh4M5v9fZP5UNDcOnMp0xN/8dJ
-
Modifies firewall policy service
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1