General
-
Target
0d1e840adbf67ef337c53ac47b139447a16601ea1de39329cc87a6ea9d1d4a2fN.exe
-
Size
1.2MB
-
Sample
241203-sky1hawlan
-
MD5
948b45f0c26a433435f6b881d38fdf80
-
SHA1
f996307d9fc781f322c3c4f659120eacbf412a02
-
SHA256
0d1e840adbf67ef337c53ac47b139447a16601ea1de39329cc87a6ea9d1d4a2f
-
SHA512
ecbad1e6197bb2a18e4c784cdff0c1ae832e1b73ede6e905b491f00bfc236c30546c78f162edb085bca8f9c858a1d3ea2978cc5172f7d12c789ee1a827c9b82d
-
SSDEEP
24576:hvpH41Cl36RgrO/+sQWdKHsJYrrg0H+2UbDC:pmvQpOY3gH2UbD
Static task
static1
Behavioral task
behavioral1
Sample
0d1e840adbf67ef337c53ac47b139447a16601ea1de39329cc87a6ea9d1d4a2fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d1e840adbf67ef337c53ac47b139447a16601ea1de39329cc87a6ea9d1d4a2fN.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
0d1e840adbf67ef337c53ac47b139447a16601ea1de39329cc87a6ea9d1d4a2fN.exe
-
Size
1.2MB
-
MD5
948b45f0c26a433435f6b881d38fdf80
-
SHA1
f996307d9fc781f322c3c4f659120eacbf412a02
-
SHA256
0d1e840adbf67ef337c53ac47b139447a16601ea1de39329cc87a6ea9d1d4a2f
-
SHA512
ecbad1e6197bb2a18e4c784cdff0c1ae832e1b73ede6e905b491f00bfc236c30546c78f162edb085bca8f9c858a1d3ea2978cc5172f7d12c789ee1a827c9b82d
-
SSDEEP
24576:hvpH41Cl36RgrO/+sQWdKHsJYrrg0H+2UbDC:pmvQpOY3gH2UbD
-
Modifies firewall policy service
-
Sality family
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Safe Mode Boot
1Modify Registry
10Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1