General
-
Target
a9b2c4abe77c59be6c8c435d4b670e1df332e3e557deb0608fb61f8264a7200f
-
Size
740KB
-
Sample
240620-b23xca1gnc
-
MD5
e530024da0fb81b9834730e53d7734b1
-
SHA1
fd339c16a5e490e1b16d102a23f862200f7c7067
-
SHA256
a9b2c4abe77c59be6c8c435d4b670e1df332e3e557deb0608fb61f8264a7200f
-
SHA512
433cd6d80b556b6cf96e94e73dacd3ac2036cea4b67feffa05ccce0f5595c6dfe83b57541ea4e39d641d85101de5f66dcd36c5ff1428e8b1f0163b92256f4cae
-
SSDEEP
12288:VTyjXW+48qWywrU4kGFezOAVuJ5PILww7F5DO3HYffsxmZ+B:ZIXW/8yw1ez54lInF5SXYHqma
Static task
static1
Behavioral task
behavioral1
Sample
a9b2c4abe77c59be6c8c435d4b670e1df332e3e557deb0608fb61f8264a7200f.exe
Resource
win7-20231129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a9b2c4abe77c59be6c8c435d4b670e1df332e3e557deb0608fb61f8264a7200f
-
Size
740KB
-
MD5
e530024da0fb81b9834730e53d7734b1
-
SHA1
fd339c16a5e490e1b16d102a23f862200f7c7067
-
SHA256
a9b2c4abe77c59be6c8c435d4b670e1df332e3e557deb0608fb61f8264a7200f
-
SHA512
433cd6d80b556b6cf96e94e73dacd3ac2036cea4b67feffa05ccce0f5595c6dfe83b57541ea4e39d641d85101de5f66dcd36c5ff1428e8b1f0163b92256f4cae
-
SSDEEP
12288:VTyjXW+48qWywrU4kGFezOAVuJ5PILww7F5DO3HYffsxmZ+B:ZIXW/8yw1ez54lInF5SXYHqma
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
8Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Hide Artifacts
2Hidden Files and Directories
2Abuse Elevation Control Mechanism
1Bypass User Account Control
1