General
-
Target
657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534
-
Size
120KB
-
Sample
240525-2f384add82
-
MD5
57174b61a9f9c01790b74a83e3a8ab63
-
SHA1
5231bedd1ad0254cea1aaca5d3bb3d143d7c80da
-
SHA256
657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534
-
SHA512
ff0b89219864381ce6fdb76e7aca630c708e79888634ddeef8b4c41e616452966351ad39b098b7cc6382a09f26230c592458965625054751156466ea7fc59498
-
SSDEEP
3072:iwMmE7AP/BMvpnIzCdasFgsBc+ROWvfQ9vhFx5:omE7AnCVRysBr06fQjFx
Static task
static1
Behavioral task
behavioral1
Sample
657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534
-
Size
120KB
-
MD5
57174b61a9f9c01790b74a83e3a8ab63
-
SHA1
5231bedd1ad0254cea1aaca5d3bb3d143d7c80da
-
SHA256
657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534
-
SHA512
ff0b89219864381ce6fdb76e7aca630c708e79888634ddeef8b4c41e616452966351ad39b098b7cc6382a09f26230c592458965625054751156466ea7fc59498
-
SSDEEP
3072:iwMmE7AP/BMvpnIzCdasFgsBc+ROWvfQ9vhFx5:omE7AnCVRysBr06fQjFx
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5