General
-
Target
b80e790ab5d67f19298bfc296e9fc14ed0372dc50d95f8d7af68c807f690cb52
-
Size
120KB
-
Sample
240616-b6qgtayarj
-
MD5
4cd27af5319026ba2439bdb3bf78b657
-
SHA1
11bbbe354bba84f75639bba852da4753f2b36bab
-
SHA256
b80e790ab5d67f19298bfc296e9fc14ed0372dc50d95f8d7af68c807f690cb52
-
SHA512
c0a0da3ac05e1f8d3674728f875c3a76bd31b5f2cfab037b1540411473cdaad52b9e64ebf17a09323ccd88911d3a7063f96a10965fe03c79fe472221dcb902c5
-
SSDEEP
3072:T62ZHmxKILKTGhWGnmiPULowMClIFA2aUwJ/Qp/DNLwSKGa:T9GtU0nFPYMCl0A2aPm/DNLuv
Static task
static1
Behavioral task
behavioral1
Sample
b80e790ab5d67f19298bfc296e9fc14ed0372dc50d95f8d7af68c807f690cb52.dll
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
b80e790ab5d67f19298bfc296e9fc14ed0372dc50d95f8d7af68c807f690cb52
-
Size
120KB
-
MD5
4cd27af5319026ba2439bdb3bf78b657
-
SHA1
11bbbe354bba84f75639bba852da4753f2b36bab
-
SHA256
b80e790ab5d67f19298bfc296e9fc14ed0372dc50d95f8d7af68c807f690cb52
-
SHA512
c0a0da3ac05e1f8d3674728f875c3a76bd31b5f2cfab037b1540411473cdaad52b9e64ebf17a09323ccd88911d3a7063f96a10965fe03c79fe472221dcb902c5
-
SSDEEP
3072:T62ZHmxKILKTGhWGnmiPULowMClIFA2aUwJ/Qp/DNLwSKGa:T9GtU0nFPYMCl0A2aPm/DNLuv
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3