General
-
Target
dfba00a78e533093c49e03096bc38c4a7bd42ab69595ea074caae3e06e36fab4
-
Size
65KB
-
Sample
240330-cdsbdaee9y
-
MD5
6686079dd5b6eb537817dc1b240a2c51
-
SHA1
1cfa433c05165518f9e14d9b6b0c1a438018f40d
-
SHA256
dfba00a78e533093c49e03096bc38c4a7bd42ab69595ea074caae3e06e36fab4
-
SHA512
70d6d6e857f3526a867c1b714e5b57dbc1f11c2935e1190ec1831112a421b78ff525bb02f175e7099929288a0ab2218dd6d7fb5481a0e4604809c0b44a24875d
-
SSDEEP
1536:xwKe0v4v0iakUxxt4ka/imrSp84zIO5KI/lERvv8yo+vWcotp32op:xPWPyt7aKmkMYKI/MEv+vWRtwop
Static task
static1
Behavioral task
behavioral1
Sample
dfba00a78e533093c49e03096bc38c4a7bd42ab69595ea074caae3e06e36fab4.exe
Resource
win7-20240319-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
dfba00a78e533093c49e03096bc38c4a7bd42ab69595ea074caae3e06e36fab4
-
Size
65KB
-
MD5
6686079dd5b6eb537817dc1b240a2c51
-
SHA1
1cfa433c05165518f9e14d9b6b0c1a438018f40d
-
SHA256
dfba00a78e533093c49e03096bc38c4a7bd42ab69595ea074caae3e06e36fab4
-
SHA512
70d6d6e857f3526a867c1b714e5b57dbc1f11c2935e1190ec1831112a421b78ff525bb02f175e7099929288a0ab2218dd6d7fb5481a0e4604809c0b44a24875d
-
SSDEEP
1536:xwKe0v4v0iakUxxt4ka/imrSp84zIO5KI/lERvv8yo+vWcotp32op:xPWPyt7aKmkMYKI/MEv+vWRtwop
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5