General
-
Target
4f92b85ae2a3e77427e610bf8e89fe321f956973b4a2558bbe1d83d41fc38fb5
-
Size
120KB
-
Sample
240517-1hkdbscd78
-
MD5
756ef1884016a1d4d9c502da43a90a80
-
SHA1
baf2683a819c65f3eed3ce066f7d96c7a5a7f315
-
SHA256
4f92b85ae2a3e77427e610bf8e89fe321f956973b4a2558bbe1d83d41fc38fb5
-
SHA512
1a52e4c696f553d5634f686ad21c9cc47b85ab75169e0691225ef6bd9230b71d2cdb24b41dc1978aee539c448c17074d8cbf893862f1c6b374a6fa9818cefa28
-
SSDEEP
3072:iAJiMJ8e/SemBWGrZ6xjFZlzU8iCDoQueWk:line/S51cxjJblW
Static task
static1
Behavioral task
behavioral1
Sample
4f92b85ae2a3e77427e610bf8e89fe321f956973b4a2558bbe1d83d41fc38fb5.dll
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4f92b85ae2a3e77427e610bf8e89fe321f956973b4a2558bbe1d83d41fc38fb5
-
Size
120KB
-
MD5
756ef1884016a1d4d9c502da43a90a80
-
SHA1
baf2683a819c65f3eed3ce066f7d96c7a5a7f315
-
SHA256
4f92b85ae2a3e77427e610bf8e89fe321f956973b4a2558bbe1d83d41fc38fb5
-
SHA512
1a52e4c696f553d5634f686ad21c9cc47b85ab75169e0691225ef6bd9230b71d2cdb24b41dc1978aee539c448c17074d8cbf893862f1c6b374a6fa9818cefa28
-
SSDEEP
3072:iAJiMJ8e/SemBWGrZ6xjFZlzU8iCDoQueWk:line/S51cxjJblW
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5