General
-
Target
a97386f66a47709bb8b3df5a1396bb646a20a52667acb2ab6992b507122641bb
-
Size
120KB
-
Sample
240617-a5zteszhpm
-
MD5
d4bb0c7d63095ffb34bdb3dee839eb0f
-
SHA1
8d13baee46125a24a9691d397e1a1cace67848a3
-
SHA256
a97386f66a47709bb8b3df5a1396bb646a20a52667acb2ab6992b507122641bb
-
SHA512
05ffdfbc80374506625e992a74758c25250d90fdfbee31923781dad9c9726b2f99c87eec624282b3a7e4707903706094b24459e8146bc96a9fd48ecb0df2dc91
-
SSDEEP
1536:gu5FYRib6XViBnEPUSaCNhBv3s6ZDbg/Z+nsM/bTLidM3EKZx/jRgZOBNpP:gu5KdVi9EPnNhBv86dg5MbTuuGZCP
Static task
static1
Behavioral task
behavioral1
Sample
a97386f66a47709bb8b3df5a1396bb646a20a52667acb2ab6992b507122641bb.dll
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
a97386f66a47709bb8b3df5a1396bb646a20a52667acb2ab6992b507122641bb
-
Size
120KB
-
MD5
d4bb0c7d63095ffb34bdb3dee839eb0f
-
SHA1
8d13baee46125a24a9691d397e1a1cace67848a3
-
SHA256
a97386f66a47709bb8b3df5a1396bb646a20a52667acb2ab6992b507122641bb
-
SHA512
05ffdfbc80374506625e992a74758c25250d90fdfbee31923781dad9c9726b2f99c87eec624282b3a7e4707903706094b24459e8146bc96a9fd48ecb0df2dc91
-
SSDEEP
1536:gu5FYRib6XViBnEPUSaCNhBv3s6ZDbg/Z+nsM/bTLidM3EKZx/jRgZOBNpP:gu5KdVi9EPnNhBv86dg5MbTuuGZCP
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3