General
-
Target
bf73a7316ff6f595c70e3b0613978f633bd8c99c5d8b353378827571ad239501
-
Size
120KB
-
Sample
240609-j3wtesgg57
-
MD5
855a8d2b35d67ae1f9742086fc091e29
-
SHA1
98639722724f403c896b7c08469189ebb93a48e2
-
SHA256
bf73a7316ff6f595c70e3b0613978f633bd8c99c5d8b353378827571ad239501
-
SHA512
bed885d1065daca30da961a183ea98e688365e0026d01a2686ab97ab4b6462132ff2a8c9e5c38855e5730e11b67c963d02ccea7d76796e05822e33676b6643b5
-
SSDEEP
3072:7oOPWuaR4Z2Q534OKETqzaiBWZPg6ExJ5dcWQ4:8LuJ05OXqOiBWlg6Exvd
Static task
static1
Behavioral task
behavioral1
Sample
bf73a7316ff6f595c70e3b0613978f633bd8c99c5d8b353378827571ad239501.dll
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bf73a7316ff6f595c70e3b0613978f633bd8c99c5d8b353378827571ad239501
-
Size
120KB
-
MD5
855a8d2b35d67ae1f9742086fc091e29
-
SHA1
98639722724f403c896b7c08469189ebb93a48e2
-
SHA256
bf73a7316ff6f595c70e3b0613978f633bd8c99c5d8b353378827571ad239501
-
SHA512
bed885d1065daca30da961a183ea98e688365e0026d01a2686ab97ab4b6462132ff2a8c9e5c38855e5730e11b67c963d02ccea7d76796e05822e33676b6643b5
-
SSDEEP
3072:7oOPWuaR4Z2Q534OKETqzaiBWZPg6ExJ5dcWQ4:8LuJ05OXqOiBWlg6Exvd
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3