Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 14:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2.exe
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2.exe
-
Size
592KB
-
MD5
1857eaefa9893bfa3cf8ee0b9c5a1a47
-
SHA1
91b2a76ce82a5a1094abf9ee0ee18ca4e1c1abc7
-
SHA256
6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2
-
SHA512
43a1749b36cf84155e8ca1f3f0aeaea223bbbf38824a1402208f8c199ae5b7dbfa1c40bdcaaa3c99eb4ddee34a883d4a19953df3b8fd2eac2033061fdd0edcd5
-
SSDEEP
12288:uMYts2jbSPPIBb/7h636HcB3Xf3SUiwV3es9yh+:dYvRHcBHqe8s9yh+
Malware Config
Extracted
Family
sality
C2
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
resource yara_rule behavioral1/memory/2384-1-0x0000000001E40000-0x0000000002EFA000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2384 6ec32a10959ca3b8f83fe2d1e880254f6346d9ebb660aa511b8af6de0aeb81b2.exe