General
-
Target
71c7bce22e17147f412ed3b25fed6ed8cbfe9ebd2e53cef904d4cbd7ccc44f8a
-
Size
65KB
-
Sample
240611-3ght8awbjb
-
MD5
83f1e8a65ac8a7c1a592306112b931f2
-
SHA1
c5cd1a01b1918219b5cab5a13d507fe66fa211a7
-
SHA256
71c7bce22e17147f412ed3b25fed6ed8cbfe9ebd2e53cef904d4cbd7ccc44f8a
-
SHA512
76258544005dc8efbc70857574ccda2998104bf05850525d5498851ebce890572dbda9df539391decef90515484733a99d3fc02cc6ad163817533a1730f96467
-
SSDEEP
1536:WTn96XzP7BZe3jmqroRrrQ7chjtMViK/S7HOcFzF:Wh6D9ZmyfBtMVp/S7uK
Static task
static1
Behavioral task
behavioral1
Sample
71c7bce22e17147f412ed3b25fed6ed8cbfe9ebd2e53cef904d4cbd7ccc44f8a.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
71c7bce22e17147f412ed3b25fed6ed8cbfe9ebd2e53cef904d4cbd7ccc44f8a
-
Size
65KB
-
MD5
83f1e8a65ac8a7c1a592306112b931f2
-
SHA1
c5cd1a01b1918219b5cab5a13d507fe66fa211a7
-
SHA256
71c7bce22e17147f412ed3b25fed6ed8cbfe9ebd2e53cef904d4cbd7ccc44f8a
-
SHA512
76258544005dc8efbc70857574ccda2998104bf05850525d5498851ebce890572dbda9df539391decef90515484733a99d3fc02cc6ad163817533a1730f96467
-
SSDEEP
1536:WTn96XzP7BZe3jmqroRrrQ7chjtMViK/S7HOcFzF:Wh6D9ZmyfBtMVp/S7uK
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3