General
-
Target
5f4bfbf96a1df3dec0d52ce0093b793aac83d8dfd184a4b3469f785040cd5360
-
Size
97KB
-
Sample
240609-arprasbe48
-
MD5
0d1752d3f4b59475bbb60bae51d56665
-
SHA1
abfee3091cac5e4eb952e5087f252324e09078a9
-
SHA256
5f4bfbf96a1df3dec0d52ce0093b793aac83d8dfd184a4b3469f785040cd5360
-
SHA512
01b69a932e9a2f0977a6a77ffc89a9cd3e7e5f3b92faed205d85fb1c4c17f9fa281e015865988bb58332543607c83ac0df8346e4e6931673a3f211c35d5bb2f6
-
SSDEEP
3072:NNW+UXWz3UveY4/LNCHWnocLazkmP+8qL8oN2FLIGQ:NNXac632noUaRRW2
Static task
static1
Behavioral task
behavioral1
Sample
5f4bfbf96a1df3dec0d52ce0093b793aac83d8dfd184a4b3469f785040cd5360.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5f4bfbf96a1df3dec0d52ce0093b793aac83d8dfd184a4b3469f785040cd5360
-
Size
97KB
-
MD5
0d1752d3f4b59475bbb60bae51d56665
-
SHA1
abfee3091cac5e4eb952e5087f252324e09078a9
-
SHA256
5f4bfbf96a1df3dec0d52ce0093b793aac83d8dfd184a4b3469f785040cd5360
-
SHA512
01b69a932e9a2f0977a6a77ffc89a9cd3e7e5f3b92faed205d85fb1c4c17f9fa281e015865988bb58332543607c83ac0df8346e4e6931673a3f211c35d5bb2f6
-
SSDEEP
3072:NNW+UXWz3UveY4/LNCHWnocLazkmP+8qL8oN2FLIGQ:NNXac632noUaRRW2
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3