General
-
Target
93d4f6c518c701ab1571a7ed202561f03aec10465e00a32d8cd9c187239dc17f
-
Size
120KB
-
Sample
240616-3zhxyaydqj
-
MD5
1082adbed9ace9eddddcd5f65fcaff68
-
SHA1
84dcc13a7ea409013b8056a15147e8022d2deea4
-
SHA256
93d4f6c518c701ab1571a7ed202561f03aec10465e00a32d8cd9c187239dc17f
-
SHA512
4ce0fe7bdc180d8093e94013a95de3942c46d2399669f5cb090472c63a7c6dda1477d2b169b85f6e7d1620983629655aac86b7e8fc0f1d57a04f62146b66912a
-
SSDEEP
1536:boNp5lu+pIOiwvIx6uLyFf+Ff8KgkNRs6qFNijwG9jHIi7l9YzSDcpH:0pu+pYxx6pf+mkNR5jw08iwzi
Static task
static1
Behavioral task
behavioral1
Sample
93d4f6c518c701ab1571a7ed202561f03aec10465e00a32d8cd9c187239dc17f.dll
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
93d4f6c518c701ab1571a7ed202561f03aec10465e00a32d8cd9c187239dc17f
-
Size
120KB
-
MD5
1082adbed9ace9eddddcd5f65fcaff68
-
SHA1
84dcc13a7ea409013b8056a15147e8022d2deea4
-
SHA256
93d4f6c518c701ab1571a7ed202561f03aec10465e00a32d8cd9c187239dc17f
-
SHA512
4ce0fe7bdc180d8093e94013a95de3942c46d2399669f5cb090472c63a7c6dda1477d2b169b85f6e7d1620983629655aac86b7e8fc0f1d57a04f62146b66912a
-
SSDEEP
1536:boNp5lu+pIOiwvIx6uLyFf+Ff8KgkNRs6qFNijwG9jHIi7l9YzSDcpH:0pu+pYxx6pf+mkNR5jw08iwzi
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5