General
-
Target
a5faf4e08934c3e4dd4bc630084f0a6839bc4d454ea369b47ec955c2f62f8f16.exe
-
Size
707KB
-
Sample
240617-bn16laxeqa
-
MD5
a0c14900b386365888755c6d66268f9e
-
SHA1
9751d2dc253c517b49cef93057e7ddcf94bb97f2
-
SHA256
a5faf4e08934c3e4dd4bc630084f0a6839bc4d454ea369b47ec955c2f62f8f16
-
SHA512
3a30f306faf898ed912563172da4d2d305a9fa50664e5d444ed003383c7e8b253fc12219fffaa8a42683e1e571c32d2335abdb3785d69eee327f9d9893c0c723
-
SSDEEP
12288:fJFZqYMOaQ0q9nV/zsnK23KHVI6nodVdyMLiqyVcxwtVxgpMiuzOT/FS799xw:hFZqhOBnVyK23C6OoYMLiVcKtVx4Miue
Static task
static1
Behavioral task
behavioral1
Sample
a5faf4e08934c3e4dd4bc630084f0a6839bc4d454ea369b47ec955c2f62f8f16.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a5faf4e08934c3e4dd4bc630084f0a6839bc4d454ea369b47ec955c2f62f8f16.exe
-
Size
707KB
-
MD5
a0c14900b386365888755c6d66268f9e
-
SHA1
9751d2dc253c517b49cef93057e7ddcf94bb97f2
-
SHA256
a5faf4e08934c3e4dd4bc630084f0a6839bc4d454ea369b47ec955c2f62f8f16
-
SHA512
3a30f306faf898ed912563172da4d2d305a9fa50664e5d444ed003383c7e8b253fc12219fffaa8a42683e1e571c32d2335abdb3785d69eee327f9d9893c0c723
-
SSDEEP
12288:fJFZqYMOaQ0q9nV/zsnK23KHVI6nodVdyMLiqyVcxwtVxgpMiuzOT/FS799xw:hFZqhOBnVyK23C6OoYMLiVcKtVx4Miue
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Pre-OS Boot
1Bootkit
1