General
-
Target
c24ce9fcde70faf35f8a507a4dac2b81ad59b6a46d7f9fe09e9cf946baf706bb
-
Size
237KB
-
Sample
240315-3k4k4afg88
-
MD5
62957f7f297e00b2c839e34ec6b99cb1
-
SHA1
b81a0629a8e5e74cf948f7cde1861ac6d56acdcd
-
SHA256
c24ce9fcde70faf35f8a507a4dac2b81ad59b6a46d7f9fe09e9cf946baf706bb
-
SHA512
aa3c5cfd2bbcfb46acff0fb7a76bf2911ce5c0ea51c2cad2e8b4927e789f1b29ec35fda9c3d46f5cb974c12062ef75554f6925df3538e307359b289fcc8998c4
-
SSDEEP
6144:6LlDX3JsQvMRlkM4RD/qzMfUW94+2PfInCZ:6xDDMRGM4h/qof14+2HsCZ
Static task
static1
Behavioral task
behavioral1
Sample
c24ce9fcde70faf35f8a507a4dac2b81ad59b6a46d7f9fe09e9cf946baf706bb.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c24ce9fcde70faf35f8a507a4dac2b81ad59b6a46d7f9fe09e9cf946baf706bb
-
Size
237KB
-
MD5
62957f7f297e00b2c839e34ec6b99cb1
-
SHA1
b81a0629a8e5e74cf948f7cde1861ac6d56acdcd
-
SHA256
c24ce9fcde70faf35f8a507a4dac2b81ad59b6a46d7f9fe09e9cf946baf706bb
-
SHA512
aa3c5cfd2bbcfb46acff0fb7a76bf2911ce5c0ea51c2cad2e8b4927e789f1b29ec35fda9c3d46f5cb974c12062ef75554f6925df3538e307359b289fcc8998c4
-
SSDEEP
6144:6LlDX3JsQvMRlkM4RD/qzMfUW94+2PfInCZ:6xDDMRGM4h/qof14+2HsCZ
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5