General
-
Target
d29ffdb142bfc66da09983e75d1a040ce9b288dd21d28e7ffb652aeed4b2eead
-
Size
65KB
-
Sample
240520-dlhmksgg69
-
MD5
96f91ec661b42bc8f0c1c8b97baf1855
-
SHA1
f3268205dc0e9887186931186981a4731e6d8f6a
-
SHA256
d29ffdb142bfc66da09983e75d1a040ce9b288dd21d28e7ffb652aeed4b2eead
-
SHA512
b35b0dee0f16fd9dc6e895f41f7c12106e0c85cba1c9c5ff04d09d99b64610cb3c6b409cbe54b8212d84607639dfb75da6e195b39abee668bcdfe412bff8d74d
-
SSDEEP
1536:zyTQM66qwAaR0WkyJIqJHszwDyFChgaClJIHRM:mMM6lwAoZJPZkFDaCJIM
Static task
static1
Behavioral task
behavioral1
Sample
d29ffdb142bfc66da09983e75d1a040ce9b288dd21d28e7ffb652aeed4b2eead.exe
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d29ffdb142bfc66da09983e75d1a040ce9b288dd21d28e7ffb652aeed4b2eead
-
Size
65KB
-
MD5
96f91ec661b42bc8f0c1c8b97baf1855
-
SHA1
f3268205dc0e9887186931186981a4731e6d8f6a
-
SHA256
d29ffdb142bfc66da09983e75d1a040ce9b288dd21d28e7ffb652aeed4b2eead
-
SHA512
b35b0dee0f16fd9dc6e895f41f7c12106e0c85cba1c9c5ff04d09d99b64610cb3c6b409cbe54b8212d84607639dfb75da6e195b39abee668bcdfe412bff8d74d
-
SSDEEP
1536:zyTQM66qwAaR0WkyJIqJHszwDyFChgaClJIHRM:mMM6lwAoZJPZkFDaCJIM
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5