General
-
Target
2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber
-
Size
2.6MB
-
Sample
240510-vbddjsfe6v
-
MD5
2a4e73343d292094887603afe35e6dcb
-
SHA1
40c0794d347ee7e2a7fc9a442e5e68f2b1e0326c
-
SHA256
17e78ed36dbb76816bae6fb3152035fbc7b1d266db850e04743c8a059fc1bd00
-
SHA512
d7b240c322cff55d1f891e37d1bcf10e0dc55963856ef127176d25848c0e17bd6850bda299dd82356cb42e7d710ac0b92f5b82ff75f5a004922e0577c4a741f5
-
SSDEEP
49152:YUJ7lASKzdiqtWxpA2RRdG5EyZqc5gvDop+HTzLcUPSbbeqmd9/V3E8QWY:5LASKZb4xSnquEmUP+
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2024-05-10_2a4e73343d292094887603afe35e6dcb_magniber
-
Size
2.6MB
-
MD5
2a4e73343d292094887603afe35e6dcb
-
SHA1
40c0794d347ee7e2a7fc9a442e5e68f2b1e0326c
-
SHA256
17e78ed36dbb76816bae6fb3152035fbc7b1d266db850e04743c8a059fc1bd00
-
SHA512
d7b240c322cff55d1f891e37d1bcf10e0dc55963856ef127176d25848c0e17bd6850bda299dd82356cb42e7d710ac0b92f5b82ff75f5a004922e0577c4a741f5
-
SSDEEP
49152:YUJ7lASKzdiqtWxpA2RRdG5EyZqc5gvDop+HTzLcUPSbbeqmd9/V3E8QWY:5LASKZb4xSnquEmUP+
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5