General
-
Target
5f7c849c318845ec5f676e02ed577218b05633d8e620fe51fdd1cae773b2d804
-
Size
207KB
-
Sample
240424-t6sahsdc89
-
MD5
984724112d38b09f1e132ad6ad574fc9
-
SHA1
240d91b775150912598be23b5cca505e259ce40c
-
SHA256
5f7c849c318845ec5f676e02ed577218b05633d8e620fe51fdd1cae773b2d804
-
SHA512
d0dff7e7b528ab9a897653c3836ca9bab6605a304ee65ec21a25af599026dbd812657d22a2344f25e59790899ec169bed425c0a5c681f8293fe005ed2bbdeceb
-
SSDEEP
3072:X+FDpK71QkbstyJjCKICpC72s/mlaX7d2IALI/BdV6ukbQBlc:X+6713bstyJj0sC7/H7d2IEI/BQuc
Static task
static1
Behavioral task
behavioral1
Sample
5f7c849c318845ec5f676e02ed577218b05633d8e620fe51fdd1cae773b2d804.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
5f7c849c318845ec5f676e02ed577218b05633d8e620fe51fdd1cae773b2d804
-
Size
207KB
-
MD5
984724112d38b09f1e132ad6ad574fc9
-
SHA1
240d91b775150912598be23b5cca505e259ce40c
-
SHA256
5f7c849c318845ec5f676e02ed577218b05633d8e620fe51fdd1cae773b2d804
-
SHA512
d0dff7e7b528ab9a897653c3836ca9bab6605a304ee65ec21a25af599026dbd812657d22a2344f25e59790899ec169bed425c0a5c681f8293fe005ed2bbdeceb
-
SSDEEP
3072:X+FDpK71QkbstyJjCKICpC72s/mlaX7d2IALI/BdV6ukbQBlc:X+6713bstyJj0sC7/H7d2IEI/BQuc
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Loads dropped DLL
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1