General
-
Target
5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677
-
Size
3.8MB
-
Sample
240615-1y8e4azgkl
-
MD5
97aa8f62fd051306841c893b51728dfb
-
SHA1
570e52e5e168a8f41e52a4bfdf9f3b8d16cb6610
-
SHA256
5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677
-
SHA512
3779254d60df0f09719858bbfd56df074178034889c5c5475917c1408dcb735b73d634be52527e19d35fe8d623ea436dfd8f8d016307ed05b9ce5ebb14b8c00e
-
SSDEEP
98304:5Vtk87VymQSv/fHR8ea3Mg6pswjzRGL7GX0cdZ3ldGGJ:5Vh7LQSfxrMks4EGkcdZGE
Static task
static1
Behavioral task
behavioral1
Sample
5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677.exe
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677
-
Size
3.8MB
-
MD5
97aa8f62fd051306841c893b51728dfb
-
SHA1
570e52e5e168a8f41e52a4bfdf9f3b8d16cb6610
-
SHA256
5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677
-
SHA512
3779254d60df0f09719858bbfd56df074178034889c5c5475917c1408dcb735b73d634be52527e19d35fe8d623ea436dfd8f8d016307ed05b9ce5ebb14b8c00e
-
SSDEEP
98304:5Vtk87VymQSv/fHR8ea3Mg6pswjzRGL7GX0cdZ3ldGGJ:5Vh7LQSfxrMks4EGkcdZGE
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Virtualization/Sandbox Evasion
1