General
-
Target
2024-04-16_22cbc52d2fed8798d1d19e466c3ad974_magniber
-
Size
4.1MB
-
Sample
240416-tf47dsec26
-
MD5
22cbc52d2fed8798d1d19e466c3ad974
-
SHA1
ed4242e8d266a90c0d022c8764936a71accd1667
-
SHA256
6e9d968723cdcb4d329e560820d30880fbfb2422ca254d128a30989efaa64543
-
SHA512
c6535341198e6f66959c7fb43895e5f9f16e2a8cad9c1ab74f35db42cfbd8edaf771c30ba32030c514393e111d4f7d739eaab3665a68a62de3944e6adeb9d902
-
SSDEEP
49152:KwkZwsIkuZyNQSJAhZLurjZI36en+stGmUI8PWzmnTiXjgQ6h+0yyP+kVhezlniZ:KwkZ3IPZbvirjZIl7ImqT0cQ6vj19J
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_22cbc52d2fed8798d1d19e466c3ad974_magniber.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2024-04-16_22cbc52d2fed8798d1d19e466c3ad974_magniber
-
Size
4.1MB
-
MD5
22cbc52d2fed8798d1d19e466c3ad974
-
SHA1
ed4242e8d266a90c0d022c8764936a71accd1667
-
SHA256
6e9d968723cdcb4d329e560820d30880fbfb2422ca254d128a30989efaa64543
-
SHA512
c6535341198e6f66959c7fb43895e5f9f16e2a8cad9c1ab74f35db42cfbd8edaf771c30ba32030c514393e111d4f7d739eaab3665a68a62de3944e6adeb9d902
-
SSDEEP
49152:KwkZwsIkuZyNQSJAhZLurjZI36en+stGmUI8PWzmnTiXjgQ6h+0yyP+kVhezlniZ:KwkZ3IPZbvirjZIl7ImqT0cQ6vj19J
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1