General
-
Target
d98164ceb5bed43f815ca2e759b652bf679d3f5f41c99933a955001505b5fff7
-
Size
65KB
-
Sample
240530-ebptksdc6z
-
MD5
2e9b0a343100fcf3e21cc09d248048f7
-
SHA1
d57111ee9f968dcaf36d0797848eaebece1b9666
-
SHA256
d98164ceb5bed43f815ca2e759b652bf679d3f5f41c99933a955001505b5fff7
-
SHA512
3b7363ef57a77772645459beb74700dc46eb8b7f98c444e81b269d6c1c795cfeb24c5b0eccf2271be25a27e59e7083d928f8fa205aaffc21b6e4a1753381d327
-
SSDEEP
1536:FQvjTXFYZ8gjPUt2kclj+Yr8wQGVAHntnJ1BiXpxw:FKTXaVTUt0lj+Yr8CAHtnXO3w
Static task
static1
Behavioral task
behavioral1
Sample
d98164ceb5bed43f815ca2e759b652bf679d3f5f41c99933a955001505b5fff7.exe
Resource
win7-20231129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d98164ceb5bed43f815ca2e759b652bf679d3f5f41c99933a955001505b5fff7
-
Size
65KB
-
MD5
2e9b0a343100fcf3e21cc09d248048f7
-
SHA1
d57111ee9f968dcaf36d0797848eaebece1b9666
-
SHA256
d98164ceb5bed43f815ca2e759b652bf679d3f5f41c99933a955001505b5fff7
-
SHA512
3b7363ef57a77772645459beb74700dc46eb8b7f98c444e81b269d6c1c795cfeb24c5b0eccf2271be25a27e59e7083d928f8fa205aaffc21b6e4a1753381d327
-
SSDEEP
1536:FQvjTXFYZ8gjPUt2kclj+Yr8wQGVAHntnJ1BiXpxw:FKTXaVTUt0lj+Yr8CAHtnXO3w
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5