General
-
Target
1417352ea2414a1becf7dbec3a6351886a4629ad8f53785e5c02b1d5bbf32bd5
-
Size
65KB
-
Sample
240530-xp2dmshe77
-
MD5
b6213dd8e79d8a54a516978d094d0f19
-
SHA1
c3257c7ec5614aad2095422c315e47515937aaed
-
SHA256
1417352ea2414a1becf7dbec3a6351886a4629ad8f53785e5c02b1d5bbf32bd5
-
SHA512
34f959b10803ef809605f082e20a19b09935b98baa72354311b0cb398575c3a0064de983d83752885b84ebd304f45e5f2e4895448c7fe8432478b9dcdf39e89e
-
SSDEEP
1536:PnDaTPVNXqiDrzCBk83zCum+AqUlvol5x9eDxFWfiQ9D72DOf:WTqQrh83M+elwHGlQJ7Tf
Static task
static1
Behavioral task
behavioral1
Sample
1417352ea2414a1becf7dbec3a6351886a4629ad8f53785e5c02b1d5bbf32bd5.exe
Resource
win7-20240419-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1417352ea2414a1becf7dbec3a6351886a4629ad8f53785e5c02b1d5bbf32bd5
-
Size
65KB
-
MD5
b6213dd8e79d8a54a516978d094d0f19
-
SHA1
c3257c7ec5614aad2095422c315e47515937aaed
-
SHA256
1417352ea2414a1becf7dbec3a6351886a4629ad8f53785e5c02b1d5bbf32bd5
-
SHA512
34f959b10803ef809605f082e20a19b09935b98baa72354311b0cb398575c3a0064de983d83752885b84ebd304f45e5f2e4895448c7fe8432478b9dcdf39e89e
-
SSDEEP
1536:PnDaTPVNXqiDrzCBk83zCum+AqUlvol5x9eDxFWfiQ9D72DOf:WTqQrh83M+elwHGlQJ7Tf
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5