General
-
Target
ec7ab6e06bd48507ee22996c7a39967a04c044a5bc8f885c9fdcb5a048bd0a61
-
Size
1.6MB
-
Sample
240418-ekwngsad43
-
MD5
16c111b130525949446db1fa86c49c78
-
SHA1
04958fe98bd7523d1b4a7363e8985b7cfce638ce
-
SHA256
ec7ab6e06bd48507ee22996c7a39967a04c044a5bc8f885c9fdcb5a048bd0a61
-
SHA512
be7205e33ea24840f4004c824f87bdad391a1871f932aa5ba6c2e0310c746be688715ed9838bd977610d4f40fa1aee4843b7275fae8f8b4192536d1634ff3633
-
SSDEEP
49152:MHifQOUBcAisd5KkXVaGocqJPaHSBizJYpTvC46b3j1:MHifQOUBcAisd5KkXVaGocqJPaHSBizT
Static task
static1
Behavioral task
behavioral1
Sample
ec7ab6e06bd48507ee22996c7a39967a04c044a5bc8f885c9fdcb5a048bd0a61.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ec7ab6e06bd48507ee22996c7a39967a04c044a5bc8f885c9fdcb5a048bd0a61
-
Size
1.6MB
-
MD5
16c111b130525949446db1fa86c49c78
-
SHA1
04958fe98bd7523d1b4a7363e8985b7cfce638ce
-
SHA256
ec7ab6e06bd48507ee22996c7a39967a04c044a5bc8f885c9fdcb5a048bd0a61
-
SHA512
be7205e33ea24840f4004c824f87bdad391a1871f932aa5ba6c2e0310c746be688715ed9838bd977610d4f40fa1aee4843b7275fae8f8b4192536d1634ff3633
-
SSDEEP
49152:MHifQOUBcAisd5KkXVaGocqJPaHSBizJYpTvC46b3j1:MHifQOUBcAisd5KkXVaGocqJPaHSBizT
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5