General
-
Target
69da6a3dfbc4553774a8a7d3074aa4b2f93ce574e560e96c9a4c244737a0da5a
-
Size
151KB
-
Sample
240615-2eybfs1dnn
-
MD5
e75a10252ae3220efc4ce15e2c5ada7f
-
SHA1
3bdc2881e97b645fd48b729ce559449b7133d8fb
-
SHA256
69da6a3dfbc4553774a8a7d3074aa4b2f93ce574e560e96c9a4c244737a0da5a
-
SHA512
70b00d8f6ad89a4bcaf078ebed340ad05acfa7b1144c801c5f0fc12aec561f9efc25a78c1042e4ee3b2d1fbe6e3a5e274389fff815fab0d0e3991d043cf007ec
-
SSDEEP
3072:FKYjRMm5CH8RWtAlk2jV6A4z13XShALof9Kr:BRMCd22JURShAH
Static task
static1
Behavioral task
behavioral1
Sample
69da6a3dfbc4553774a8a7d3074aa4b2f93ce574e560e96c9a4c244737a0da5a.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
69da6a3dfbc4553774a8a7d3074aa4b2f93ce574e560e96c9a4c244737a0da5a
-
Size
151KB
-
MD5
e75a10252ae3220efc4ce15e2c5ada7f
-
SHA1
3bdc2881e97b645fd48b729ce559449b7133d8fb
-
SHA256
69da6a3dfbc4553774a8a7d3074aa4b2f93ce574e560e96c9a4c244737a0da5a
-
SHA512
70b00d8f6ad89a4bcaf078ebed340ad05acfa7b1144c801c5f0fc12aec561f9efc25a78c1042e4ee3b2d1fbe6e3a5e274389fff815fab0d0e3991d043cf007ec
-
SSDEEP
3072:FKYjRMm5CH8RWtAlk2jV6A4z13XShALof9Kr:BRMCd22JURShAH
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1