General
-
Target
58ef3536592acc4fe95284664e89720823b8db3de7b4d0fc2a6a241e8ee127b3
-
Size
120KB
-
Sample
240510-1jsq4aeb64
-
MD5
b22f64b664cd593d8caf9348b0ab2289
-
SHA1
8df3fa14478c2d07b1acb0a2e428f349a83c07ad
-
SHA256
58ef3536592acc4fe95284664e89720823b8db3de7b4d0fc2a6a241e8ee127b3
-
SHA512
1d24c3b4a75decaf970d7a883ea57826f0274eba93b4a506c6adb7ea5aa895d3b21268894967ccc5e773ab4e21b684cd50b2e4377509be60b0cd5e9a6a16f3b6
-
SSDEEP
1536:VxgYV+IcPjDuyEtTs9Rn8g0SUVghgaN/AmJeVYF7TF8jbKTZLu33X3vOf9tsrO/:8/jDuttAv8g0Dsg+/AmcVe1pMHv6OO
Static task
static1
Behavioral task
behavioral1
Sample
58ef3536592acc4fe95284664e89720823b8db3de7b4d0fc2a6a241e8ee127b3.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
58ef3536592acc4fe95284664e89720823b8db3de7b4d0fc2a6a241e8ee127b3
-
Size
120KB
-
MD5
b22f64b664cd593d8caf9348b0ab2289
-
SHA1
8df3fa14478c2d07b1acb0a2e428f349a83c07ad
-
SHA256
58ef3536592acc4fe95284664e89720823b8db3de7b4d0fc2a6a241e8ee127b3
-
SHA512
1d24c3b4a75decaf970d7a883ea57826f0274eba93b4a506c6adb7ea5aa895d3b21268894967ccc5e773ab4e21b684cd50b2e4377509be60b0cd5e9a6a16f3b6
-
SSDEEP
1536:VxgYV+IcPjDuyEtTs9Rn8g0SUVghgaN/AmJeVYF7TF8jbKTZLu33X3vOf9tsrO/:8/jDuttAv8g0Dsg+/AmcVe1pMHv6OO
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5