General
-
Target
f2d4b46298c0db8261961f037da10588a6a0e923d0b28bf6b2e050916e2ce1e3
-
Size
542KB
-
Sample
240521-glwqzsfh57
-
MD5
a38376be489ffc8ab2ab5a451a4ee805
-
SHA1
570acbab0528e5af9a14b15541259bd43d36abdc
-
SHA256
f2d4b46298c0db8261961f037da10588a6a0e923d0b28bf6b2e050916e2ce1e3
-
SHA512
5c591ef2111afb2cc643b9965ce05417e815462e8713ecaa84de05f3728542c6c28b32d1094cc8e10d3d9300a6172cb30a5fe0358570ed9a879caba46fd7a177
-
SSDEEP
6144:QIIIIxcvYgcFmWnp7wbEj5BRYELb6L9uv1tIAul6p+AOy6PUhU0XlSb7PAT/eFGz:crgZWpluEP6LcWl6p+og9PkGw6/dQ
Static task
static1
Behavioral task
behavioral1
Sample
f2d4b46298c0db8261961f037da10588a6a0e923d0b28bf6b2e050916e2ce1e3.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f2d4b46298c0db8261961f037da10588a6a0e923d0b28bf6b2e050916e2ce1e3
-
Size
542KB
-
MD5
a38376be489ffc8ab2ab5a451a4ee805
-
SHA1
570acbab0528e5af9a14b15541259bd43d36abdc
-
SHA256
f2d4b46298c0db8261961f037da10588a6a0e923d0b28bf6b2e050916e2ce1e3
-
SHA512
5c591ef2111afb2cc643b9965ce05417e815462e8713ecaa84de05f3728542c6c28b32d1094cc8e10d3d9300a6172cb30a5fe0358570ed9a879caba46fd7a177
-
SSDEEP
6144:QIIIIxcvYgcFmWnp7wbEj5BRYELb6L9uv1tIAul6p+AOy6PUhU0XlSb7PAT/eFGz:crgZWpluEP6LcWl6p+og9PkGw6/dQ
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5