General
-
Target
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe
-
Size
1.1MB
-
Sample
241203-yl6dvs1le1
-
MD5
c832f6489b257134b75c3108b02c3bd0
-
SHA1
3c0e169c5b51d3cd599afaec3559408ee0978f1a
-
SHA256
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03c
-
SHA512
0dc42315fba0c7ece9257092787401748e12ded10fca2648ed3949b1732c8257d5893c39d3c42bfd9a7e37689213016c6da40574454d46386547e910e4226650
-
SSDEEP
24576:W1/aGLDCM4D8ayGMCPnXo8/18o4YYfDV7I8qgk4YkVvfKtbFVixj4uLhYfqa:FD8ayGM0XolV7I8rYkVvfKtbFVixj4uw
Static task
static1
Behavioral task
behavioral1
Sample
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03cN.exe
-
Size
1.1MB
-
MD5
c832f6489b257134b75c3108b02c3bd0
-
SHA1
3c0e169c5b51d3cd599afaec3559408ee0978f1a
-
SHA256
2f19beaf8472389ddd42493af49185cb0e656bfb2aa96a36a3fe05b7b2f6d03c
-
SHA512
0dc42315fba0c7ece9257092787401748e12ded10fca2648ed3949b1732c8257d5893c39d3c42bfd9a7e37689213016c6da40574454d46386547e910e4226650
-
SSDEEP
24576:W1/aGLDCM4D8ayGMCPnXo8/18o4YYfDV7I8qgk4YkVvfKtbFVixj4uLhYfqa:FD8ayGM0XolV7I8rYkVvfKtbFVixj4uw
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6