Analysis

  • max time kernel
    93s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 21:38

General

  • Target

    d0107329fcb98d55e7be5ec2fa67fa19b4a7ed6a9a4e96d3287d88b73d2fab1e.exe

  • Size

    3.4MB

  • MD5

    690f17da7c5ab23f868a023739e46cc7

  • SHA1

    069637b189b9f502649e1b6ec81782a86aa09e57

  • SHA256

    d0107329fcb98d55e7be5ec2fa67fa19b4a7ed6a9a4e96d3287d88b73d2fab1e

  • SHA512

    ff94e4a991ed51c5515249d10b31549886d8e37a15d587eea1d728e8a781716dd950b3ae9071b5eb7ab1ce0649878071cd525d5a831f492f3d170c1941fa0a5b

  • SSDEEP

    3072:rMQBbBjVaIrUvekxvLH+lUl9cZBSdsPdzohGpoug9oPitziDJqFs6CcGtXebDfjV:IibZNrroils9capp1iV6s6CcueHMp4

Score
10/10

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0107329fcb98d55e7be5ec2fa67fa19b4a7ed6a9a4e96d3287d88b73d2fab1e.exe
    "C:\Users\Admin\AppData\Local\Temp\d0107329fcb98d55e7be5ec2fa67fa19b4a7ed6a9a4e96d3287d88b73d2fab1e.exe"
    1⤵
      PID:2988

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2988-0-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB

          • memory/2988-1-0x0000000002330000-0x00000000033EA000-memory.dmp

            Filesize

            16.7MB

          • memory/2988-2-0x0000000000400000-0x000000000043D000-memory.dmp

            Filesize

            244KB