General
-
Target
9b32ce1874ec08508778f9691984477dbad390f16e6df9c56f814b7b0f2def1b
-
Size
120KB
-
Sample
240522-ekaq1sbd64
-
MD5
34272011b912d637535ed2efa5008323
-
SHA1
907db9c0faebf7e4b38566016dc098d9b7ce0cbd
-
SHA256
9b32ce1874ec08508778f9691984477dbad390f16e6df9c56f814b7b0f2def1b
-
SHA512
669a83eead97a314b7004afdcced0ed8697a8489dd2f4287ef539ed5eb74c2e4c500fcc0b55346f8f0b95e3421fccf7d8a91962ce53c8c1a9c510b7b49eee177
-
SSDEEP
3072:ajpPkInIEMSrx9ywml61p8XKYzOZywFlM:ajpkInIEN19Ql6b8aYyl
Static task
static1
Behavioral task
behavioral1
Sample
9b32ce1874ec08508778f9691984477dbad390f16e6df9c56f814b7b0f2def1b.dll
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
9b32ce1874ec08508778f9691984477dbad390f16e6df9c56f814b7b0f2def1b
-
Size
120KB
-
MD5
34272011b912d637535ed2efa5008323
-
SHA1
907db9c0faebf7e4b38566016dc098d9b7ce0cbd
-
SHA256
9b32ce1874ec08508778f9691984477dbad390f16e6df9c56f814b7b0f2def1b
-
SHA512
669a83eead97a314b7004afdcced0ed8697a8489dd2f4287ef539ed5eb74c2e4c500fcc0b55346f8f0b95e3421fccf7d8a91962ce53c8c1a9c510b7b49eee177
-
SSDEEP
3072:ajpPkInIEMSrx9ywml61p8XKYzOZywFlM:ajpkInIEN19Ql6b8aYyl
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5