General
-
Target
d194a49af22ffc16f86d5269446e55d2823f4c236770331026d197d380cb2314
-
Size
120KB
-
Sample
240526-ds446ach9v
-
MD5
840fa30e8f93b1836988687d548197e8
-
SHA1
9580cf08f6d5c0950214c50966c52d44ea09d72c
-
SHA256
d194a49af22ffc16f86d5269446e55d2823f4c236770331026d197d380cb2314
-
SHA512
132e4e2fb545e8a39924dc773d79bef1e33dde101e1425850538bc965a29ac6ed2b14960df9d15aea5926ef0f420860c408392514ad2b2e62b7435f02de48ef6
-
SSDEEP
1536:4AjpoQvgaccPjlBHRrcMRKQKNdrgSTJbAIa9ptaXe:4Ap4accLllRoMqPgSdRa93a
Static task
static1
Behavioral task
behavioral1
Sample
d194a49af22ffc16f86d5269446e55d2823f4c236770331026d197d380cb2314.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d194a49af22ffc16f86d5269446e55d2823f4c236770331026d197d380cb2314
-
Size
120KB
-
MD5
840fa30e8f93b1836988687d548197e8
-
SHA1
9580cf08f6d5c0950214c50966c52d44ea09d72c
-
SHA256
d194a49af22ffc16f86d5269446e55d2823f4c236770331026d197d380cb2314
-
SHA512
132e4e2fb545e8a39924dc773d79bef1e33dde101e1425850538bc965a29ac6ed2b14960df9d15aea5926ef0f420860c408392514ad2b2e62b7435f02de48ef6
-
SSDEEP
1536:4AjpoQvgaccPjlBHRrcMRKQKNdrgSTJbAIa9ptaXe:4Ap4accLllRoMqPgSdRa93a
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5