General
-
Target
bc78824043cc917d1269f4d0b1fb4b4c081c42d691ed10e16eefcba4311db728
-
Size
65KB
-
Sample
240529-b6gjxaec52
-
MD5
8ba5675e93308c8d0585008cca61f1b9
-
SHA1
dda102e393553575ccd5f7a802edb03db33d1420
-
SHA256
bc78824043cc917d1269f4d0b1fb4b4c081c42d691ed10e16eefcba4311db728
-
SHA512
84241c1066b50d3a97bcda16557d6fe87fe36f4f907d5a0fe40f2b1b69494a052b4f0f260ab74be0fad344c72fb2290356d20e08542a56a5446d21fce3a37cca
-
SSDEEP
1536:seFv+vXHZhH/CogfaEiF4h+0oZaCfZ6aYoUf1ki:JFY5hH/7gftk0+aCs1f1ki
Static task
static1
Behavioral task
behavioral1
Sample
bc78824043cc917d1269f4d0b1fb4b4c081c42d691ed10e16eefcba4311db728.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bc78824043cc917d1269f4d0b1fb4b4c081c42d691ed10e16eefcba4311db728
-
Size
65KB
-
MD5
8ba5675e93308c8d0585008cca61f1b9
-
SHA1
dda102e393553575ccd5f7a802edb03db33d1420
-
SHA256
bc78824043cc917d1269f4d0b1fb4b4c081c42d691ed10e16eefcba4311db728
-
SHA512
84241c1066b50d3a97bcda16557d6fe87fe36f4f907d5a0fe40f2b1b69494a052b4f0f260ab74be0fad344c72fb2290356d20e08542a56a5446d21fce3a37cca
-
SSDEEP
1536:seFv+vXHZhH/CogfaEiF4h+0oZaCfZ6aYoUf1ki:JFY5hH/7gftk0+aCs1f1ki
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5