General
-
Target
35a34ecdc36d91df6f11b635088eaf166e56829a3e69b66ea5fb40f1601bc365
-
Size
120KB
-
Sample
240524-y8j45shh9z
-
MD5
7e8b3cbe05787b5d3bdf2dacf2c03b11
-
SHA1
287308d1aed1dfba843908356a499010dc3aa4bc
-
SHA256
35a34ecdc36d91df6f11b635088eaf166e56829a3e69b66ea5fb40f1601bc365
-
SHA512
6f02e8edce43ab172351b45794b2a3468e4600eca1bec16d4be4e41f81f8bf6261e2678ebce47abff5128b33f5e49bca318ace587057aae6a579bb466bfd2617
-
SSDEEP
3072:bfMR6/E0629tRf4Yq9Rea5ZzzbhdOq28zPF:o72J2M2fZ2uP
Static task
static1
Behavioral task
behavioral1
Sample
35a34ecdc36d91df6f11b635088eaf166e56829a3e69b66ea5fb40f1601bc365.dll
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
35a34ecdc36d91df6f11b635088eaf166e56829a3e69b66ea5fb40f1601bc365
-
Size
120KB
-
MD5
7e8b3cbe05787b5d3bdf2dacf2c03b11
-
SHA1
287308d1aed1dfba843908356a499010dc3aa4bc
-
SHA256
35a34ecdc36d91df6f11b635088eaf166e56829a3e69b66ea5fb40f1601bc365
-
SHA512
6f02e8edce43ab172351b45794b2a3468e4600eca1bec16d4be4e41f81f8bf6261e2678ebce47abff5128b33f5e49bca318ace587057aae6a579bb466bfd2617
-
SSDEEP
3072:bfMR6/E0629tRf4Yq9Rea5ZzzbhdOq28zPF:o72J2M2fZ2uP
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5