General
-
Target
6c6b8a3bf7b5aee2b02d01b39a75b09f152c1a1577b4f17f30992a8199458849
-
Size
65KB
-
Sample
240314-y8wg6sgd68
-
MD5
bf84dfd1b31610af5ceb4179b7e1458d
-
SHA1
3968111e1f49f55b643e3291544ab5e948094891
-
SHA256
6c6b8a3bf7b5aee2b02d01b39a75b09f152c1a1577b4f17f30992a8199458849
-
SHA512
dfeddbceb7456353a335d64aac46bc61c57df3a9925ff98e1c92b7a136b4a1391aa690fc874611067ad35576959242bc783b52aee8c53a101e53ea54ca6a1da9
-
SSDEEP
1536:49Uvn/1Zg4pzyci4msuIGz46k8Cog+gcz1viLNn9Yh:YUftHpmci4mRHkloAO1aLNnih
Static task
static1
Behavioral task
behavioral1
Sample
6c6b8a3bf7b5aee2b02d01b39a75b09f152c1a1577b4f17f30992a8199458849.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6c6b8a3bf7b5aee2b02d01b39a75b09f152c1a1577b4f17f30992a8199458849
-
Size
65KB
-
MD5
bf84dfd1b31610af5ceb4179b7e1458d
-
SHA1
3968111e1f49f55b643e3291544ab5e948094891
-
SHA256
6c6b8a3bf7b5aee2b02d01b39a75b09f152c1a1577b4f17f30992a8199458849
-
SHA512
dfeddbceb7456353a335d64aac46bc61c57df3a9925ff98e1c92b7a136b4a1391aa690fc874611067ad35576959242bc783b52aee8c53a101e53ea54ca6a1da9
-
SSDEEP
1536:49Uvn/1Zg4pzyci4msuIGz46k8Cog+gcz1viLNn9Yh:YUftHpmci4mRHkloAO1aLNnih
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5