General
-
Target
6f9423b833c15a914b3836421c96173eec59241ef497c2d6938f22690646346f
-
Size
65KB
-
Sample
240524-239dmaef83
-
MD5
5a0f31ddd86ab6cd6afc9742f0513117
-
SHA1
12c52f5376f18173d529cffb80f2a29c029d83bd
-
SHA256
6f9423b833c15a914b3836421c96173eec59241ef497c2d6938f22690646346f
-
SHA512
80f16dd039f82be5114662293faf9ab65bada50e727633f33886b48b9fe6b3b21811044c9392fe86cb4d855352d2455fb098cf4fa8cc87445a118da75c140b60
-
SSDEEP
1536:+Syr3Gjy+6end/TCthm4kHJ4WBiIGmM+0c8WuIfEbMxaz0:+fr3Gjy+9/Wzm4kHJ4TIGf+d4I8gxK0
Static task
static1
Behavioral task
behavioral1
Sample
6f9423b833c15a914b3836421c96173eec59241ef497c2d6938f22690646346f.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6f9423b833c15a914b3836421c96173eec59241ef497c2d6938f22690646346f
-
Size
65KB
-
MD5
5a0f31ddd86ab6cd6afc9742f0513117
-
SHA1
12c52f5376f18173d529cffb80f2a29c029d83bd
-
SHA256
6f9423b833c15a914b3836421c96173eec59241ef497c2d6938f22690646346f
-
SHA512
80f16dd039f82be5114662293faf9ab65bada50e727633f33886b48b9fe6b3b21811044c9392fe86cb4d855352d2455fb098cf4fa8cc87445a118da75c140b60
-
SSDEEP
1536:+Syr3Gjy+6end/TCthm4kHJ4WBiIGmM+0c8WuIfEbMxaz0:+fr3Gjy+9/Wzm4kHJ4TIGf+d4I8gxK0
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5