General
-
Target
192cc3439a33ba7992518cf85a8e439bbf566bdaf083d7528a67af9c65cdb998
-
Size
120KB
-
Sample
240504-zq23nsea99
-
MD5
6152086b775886cba266927a0e32753b
-
SHA1
a1aa3a18a77b34805e73ab6af695618ae6f4781c
-
SHA256
192cc3439a33ba7992518cf85a8e439bbf566bdaf083d7528a67af9c65cdb998
-
SHA512
a7af34073df9cc030c56cd6de9361043b71bed08580095be4ff31330a43f8d1258fb13cf2164633ef30bdf58009ccd0ca2fcbc1e846551b44d170d52b96e489e
-
SSDEEP
1536:SUGCrOixYxh1t8wl682LdtX6Y4JQiSRYCno9NBoxx8QqrL7OaFvIc87c2:/GCt61+wsz3iQiSRJno9s8J/TvIc8
Static task
static1
Behavioral task
behavioral1
Sample
192cc3439a33ba7992518cf85a8e439bbf566bdaf083d7528a67af9c65cdb998.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
192cc3439a33ba7992518cf85a8e439bbf566bdaf083d7528a67af9c65cdb998
-
Size
120KB
-
MD5
6152086b775886cba266927a0e32753b
-
SHA1
a1aa3a18a77b34805e73ab6af695618ae6f4781c
-
SHA256
192cc3439a33ba7992518cf85a8e439bbf566bdaf083d7528a67af9c65cdb998
-
SHA512
a7af34073df9cc030c56cd6de9361043b71bed08580095be4ff31330a43f8d1258fb13cf2164633ef30bdf58009ccd0ca2fcbc1e846551b44d170d52b96e489e
-
SSDEEP
1536:SUGCrOixYxh1t8wl682LdtX6Y4JQiSRYCno9NBoxx8QqrL7OaFvIc87c2:/GCt61+wsz3iQiSRJno9s8J/TvIc8
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5