General
-
Target
a7d614034ce4ee1e0ea4b1aa360f963ccbe1571e00dcd4a385775371bc4fbc26
-
Size
1.4MB
-
Sample
240530-bqeelshc5y
-
MD5
1bc1e1954201da6878f6346a96db23a5
-
SHA1
d6b573c42cfde3e65c3b13bad483a49542b9f334
-
SHA256
a7d614034ce4ee1e0ea4b1aa360f963ccbe1571e00dcd4a385775371bc4fbc26
-
SHA512
fe29627c12470176f088c465daa1692e089c1309e4f393243f24b0b9941151a7ba934dddaf52d83cac2006f6fb36d5c53a7298408b6d993a9751e7a6141655cb
-
SSDEEP
24576:U5v0UtYJN3UAEny0oRwVZlCvQ3cRB7aBq3U9T3Ga2vRwXz9FnEQs4ZuaiMpHJJ8D:oj23d9DRwblCvQ3g7c39jsiX/ECZViE4
Static task
static1
Behavioral task
behavioral1
Sample
a7d614034ce4ee1e0ea4b1aa360f963ccbe1571e00dcd4a385775371bc4fbc26.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a7d614034ce4ee1e0ea4b1aa360f963ccbe1571e00dcd4a385775371bc4fbc26
-
Size
1.4MB
-
MD5
1bc1e1954201da6878f6346a96db23a5
-
SHA1
d6b573c42cfde3e65c3b13bad483a49542b9f334
-
SHA256
a7d614034ce4ee1e0ea4b1aa360f963ccbe1571e00dcd4a385775371bc4fbc26
-
SHA512
fe29627c12470176f088c465daa1692e089c1309e4f393243f24b0b9941151a7ba934dddaf52d83cac2006f6fb36d5c53a7298408b6d993a9751e7a6141655cb
-
SSDEEP
24576:U5v0UtYJN3UAEny0oRwVZlCvQ3cRB7aBq3U9T3Ga2vRwXz9FnEQs4ZuaiMpHJJ8D:oj23d9DRwblCvQ3g7c39jsiX/ECZViE4
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1