General
-
Target
4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295
-
Size
65KB
-
Sample
240613-175qkawenj
-
MD5
011623b8cc16dbf1cd4efaef761441a3
-
SHA1
924c965712c1d58820706ab34740b774e2cc50e1
-
SHA256
4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295
-
SHA512
03940d58cb029bbfe96c20df6db109767afdff77bcd5ba2f8077f7bd15628718524e7a112634c5aa2c7a16557796283a0768d9349fd56b3db885033b8a493c62
-
SSDEEP
1536:Cy602lLwoE0WwUKZZekEj2r/6qdrhecc1A05i7ernKXbJ:A/lR/W/KZwxCJ9spO7+wbJ
Static task
static1
Behavioral task
behavioral1
Sample
4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295
-
Size
65KB
-
MD5
011623b8cc16dbf1cd4efaef761441a3
-
SHA1
924c965712c1d58820706ab34740b774e2cc50e1
-
SHA256
4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295
-
SHA512
03940d58cb029bbfe96c20df6db109767afdff77bcd5ba2f8077f7bd15628718524e7a112634c5aa2c7a16557796283a0768d9349fd56b3db885033b8a493c62
-
SSDEEP
1536:Cy602lLwoE0WwUKZZekEj2r/6qdrhecc1A05i7ernKXbJ:A/lR/W/KZwxCJ9spO7+wbJ
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5