General
-
Target
2cddff11ff6acfca27dc104584071a4c7d5b4a56446d5250e4714bce25b269b9
-
Size
246KB
-
Sample
240517-yr5phsgd5v
-
MD5
3610a65e3059ac9b5fc668e563e47d67
-
SHA1
f51ba903a1f3ae824509001704f851494d45ae70
-
SHA256
2cddff11ff6acfca27dc104584071a4c7d5b4a56446d5250e4714bce25b269b9
-
SHA512
e7260adb757c7a0762c8feb625ed887f4bc99dcb928de2e2d1ad3f8e81ac647174135297ec143ba73ec22e4746af2fabc702f030a00e96903c25d54107b35f15
-
SSDEEP
6144:WIIII8vME3QpXRGg461AhoyojQ7j3/KdleQCMVTy3Mio:1vMEMXRGunxjQX3/Kds0
Static task
static1
Behavioral task
behavioral1
Sample
2cddff11ff6acfca27dc104584071a4c7d5b4a56446d5250e4714bce25b269b9.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2cddff11ff6acfca27dc104584071a4c7d5b4a56446d5250e4714bce25b269b9
-
Size
246KB
-
MD5
3610a65e3059ac9b5fc668e563e47d67
-
SHA1
f51ba903a1f3ae824509001704f851494d45ae70
-
SHA256
2cddff11ff6acfca27dc104584071a4c7d5b4a56446d5250e4714bce25b269b9
-
SHA512
e7260adb757c7a0762c8feb625ed887f4bc99dcb928de2e2d1ad3f8e81ac647174135297ec143ba73ec22e4746af2fabc702f030a00e96903c25d54107b35f15
-
SSDEEP
6144:WIIII8vME3QpXRGg461AhoyojQ7j3/KdleQCMVTy3Mio:1vMEMXRGunxjQX3/Kds0
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1