General
-
Target
4340a864e7d2b2972bae02724e30ea495783b95dd23ba7fc0f4f87fd23394448
-
Size
65KB
-
Sample
240628-zn4tgsvcqq
-
MD5
9d14cc05041220a56a50e4049670ef9b
-
SHA1
11e6c9597ae8b7b6736c99adfe0ade268991c7e4
-
SHA256
4340a864e7d2b2972bae02724e30ea495783b95dd23ba7fc0f4f87fd23394448
-
SHA512
7f7c3902020eff195df0ab7ff1de5dba700568f48adbf3a8edc77c272dbc34245b163b68ea5ad915eed49eca315093305601ed9248a14bf5f53edb357ca384f5
-
SSDEEP
1536:gphSPJFm1ea8V7U/momUVDPRJMjNF8ayejS03k6gRu:ShsFzrV7U/morjeOn7g
Static task
static1
Behavioral task
behavioral1
Sample
4340a864e7d2b2972bae02724e30ea495783b95dd23ba7fc0f4f87fd23394448.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
4340a864e7d2b2972bae02724e30ea495783b95dd23ba7fc0f4f87fd23394448
-
Size
65KB
-
MD5
9d14cc05041220a56a50e4049670ef9b
-
SHA1
11e6c9597ae8b7b6736c99adfe0ade268991c7e4
-
SHA256
4340a864e7d2b2972bae02724e30ea495783b95dd23ba7fc0f4f87fd23394448
-
SHA512
7f7c3902020eff195df0ab7ff1de5dba700568f48adbf3a8edc77c272dbc34245b163b68ea5ad915eed49eca315093305601ed9248a14bf5f53edb357ca384f5
-
SSDEEP
1536:gphSPJFm1ea8V7U/momUVDPRJMjNF8ayejS03k6gRu:ShsFzrV7U/morjeOn7g
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5