General
-
Target
b9ba1ac421fa2b27447bfb9aeb3239d418c2a2db57ef75c7b3429a90b8c2534e
-
Size
97KB
-
Sample
240603-dc836sgf81
-
MD5
a3ac7a77366f0312dd67bbb9989e169b
-
SHA1
0c317f054d9ebf10f8aea4f6a77c6fe89971292a
-
SHA256
b9ba1ac421fa2b27447bfb9aeb3239d418c2a2db57ef75c7b3429a90b8c2534e
-
SHA512
d82403ff443d72f4a0f3be4268b3ba32af6f539bdb5b3e11daa862cbc403f0f51c0db2cd88eaaa8c4cae344f998a59a0bc1b274923832b877c55a7d8eb8a5cde
-
SSDEEP
1536:Z0iLuFuWsCjN04UY4F8xeZVu5Bm/Zqw/7ZBhOj3ZQvCglHFb0gFfadNpLuF:iPRxN04UgQZVu8/Lp+JQv/lHFbFFsN8
Static task
static1
Behavioral task
behavioral1
Sample
b9ba1ac421fa2b27447bfb9aeb3239d418c2a2db57ef75c7b3429a90b8c2534e.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b9ba1ac421fa2b27447bfb9aeb3239d418c2a2db57ef75c7b3429a90b8c2534e
-
Size
97KB
-
MD5
a3ac7a77366f0312dd67bbb9989e169b
-
SHA1
0c317f054d9ebf10f8aea4f6a77c6fe89971292a
-
SHA256
b9ba1ac421fa2b27447bfb9aeb3239d418c2a2db57ef75c7b3429a90b8c2534e
-
SHA512
d82403ff443d72f4a0f3be4268b3ba32af6f539bdb5b3e11daa862cbc403f0f51c0db2cd88eaaa8c4cae344f998a59a0bc1b274923832b877c55a7d8eb8a5cde
-
SSDEEP
1536:Z0iLuFuWsCjN04UY4F8xeZVu5Bm/Zqw/7ZBhOj3ZQvCglHFb0gFfadNpLuF:iPRxN04UgQZVu8/Lp+JQv/lHFbFFsN8
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5