General
-
Target
741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce
-
Size
120KB
-
Sample
240517-ad6snaga83
-
MD5
e133f88ce39fc934285f30c3cbd4ddac
-
SHA1
f4a7bcb49799efda5028bb81e77c70e5edbc6a4e
-
SHA256
741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce
-
SHA512
1fd9cf6240360247d8c3e816488ed3cdf0fbe3baa316ca029ba094d4f7987bf0f9e1575501f88a4f10115e40c48fba3037eccbaeea1568d1afdcc0cd14fadf75
-
SSDEEP
3072:+sskbVv225cHuRCTzcwZdoz3UZSqOwNHZ3caitoCWXO:+sxV2NtTz5uzkZow33uw
Static task
static1
Behavioral task
behavioral1
Sample
741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce
-
Size
120KB
-
MD5
e133f88ce39fc934285f30c3cbd4ddac
-
SHA1
f4a7bcb49799efda5028bb81e77c70e5edbc6a4e
-
SHA256
741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce
-
SHA512
1fd9cf6240360247d8c3e816488ed3cdf0fbe3baa316ca029ba094d4f7987bf0f9e1575501f88a4f10115e40c48fba3037eccbaeea1568d1afdcc0cd14fadf75
-
SSDEEP
3072:+sskbVv225cHuRCTzcwZdoz3UZSqOwNHZ3caitoCWXO:+sxV2NtTz5uzkZow33uw
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5