General
-
Target
974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee
-
Size
120KB
-
Sample
240526-a86fdagg4w
-
MD5
05dd850633ea7246a69fbdf9a9cdc75d
-
SHA1
a891563774aac23084f9ae4f11ac22931180c99c
-
SHA256
974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee
-
SHA512
c737a83ac81f63b0508c6dc1a4080f29dfffe844e9413888de52631b755e0d5f1abdaae6a0cc724b21ad52f9faacc840a0bd8249f74f680b2df4d0ef5202a0ea
-
SSDEEP
3072:2M6sqyst4JB/k1d9sVCeYG7gteFwChbpTAxU6BB4:2Rmo1f0CMWey6dgQ
Static task
static1
Behavioral task
behavioral1
Sample
974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee
-
Size
120KB
-
MD5
05dd850633ea7246a69fbdf9a9cdc75d
-
SHA1
a891563774aac23084f9ae4f11ac22931180c99c
-
SHA256
974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee
-
SHA512
c737a83ac81f63b0508c6dc1a4080f29dfffe844e9413888de52631b755e0d5f1abdaae6a0cc724b21ad52f9faacc840a0bd8249f74f680b2df4d0ef5202a0ea
-
SSDEEP
3072:2M6sqyst4JB/k1d9sVCeYG7gteFwChbpTAxU6BB4:2Rmo1f0CMWey6dgQ
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5