General
-
Target
2024-06-15_df42d89cd6441b780ec0bfaa2f5bf589_avoslocker
-
Size
1001KB
-
Sample
240615-pvykyavckq
-
MD5
df42d89cd6441b780ec0bfaa2f5bf589
-
SHA1
1faadfb87859eb6e77693898e095e4dc3438af35
-
SHA256
fcc3cf6c4310bd23e6201727d98916fd9831041ef90710a37193b5986b09335e
-
SHA512
4e67d86887c5f5b5c362313bed9a8f278db13dfa4bf2fe211548010e60f8d25844aae35e1d80ae5f8add3cf6a4e5c13868f57217ccefe78e673a92a9d2af3a6f
-
SSDEEP
24576:nNbP+i822rvtMR82UumYYmyUfWmfy7NWlVeh5WKg8QT6ckW:n5+j6+2UumYYmycWmfy5WlVeOKgQcz
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_df42d89cd6441b780ec0bfaa2f5bf589_avoslocker.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
2024-06-15_df42d89cd6441b780ec0bfaa2f5bf589_avoslocker
-
Size
1001KB
-
MD5
df42d89cd6441b780ec0bfaa2f5bf589
-
SHA1
1faadfb87859eb6e77693898e095e4dc3438af35
-
SHA256
fcc3cf6c4310bd23e6201727d98916fd9831041ef90710a37193b5986b09335e
-
SHA512
4e67d86887c5f5b5c362313bed9a8f278db13dfa4bf2fe211548010e60f8d25844aae35e1d80ae5f8add3cf6a4e5c13868f57217ccefe78e673a92a9d2af3a6f
-
SSDEEP
24576:nNbP+i822rvtMR82UumYYmyUfWmfy7NWlVeh5WKg8QT6ckW:n5+j6+2UumYYmycWmfy5WlVeOKgQcz
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1