General
-
Target
57f2464aa7cd73a85e2c36d3cd4146627bc5544b86efef4b29a8f3bf6725f395
-
Size
173KB
-
Sample
241207-2spw8stler
-
MD5
e1b3afd58ac96bf02fa4ca7c20b3ec56
-
SHA1
b8dedf53d0f3a712d8293f0edf125a7c19049247
-
SHA256
57f2464aa7cd73a85e2c36d3cd4146627bc5544b86efef4b29a8f3bf6725f395
-
SHA512
a52f947b1caac3cbb9abce75e650e1668010e8dcfbb237e8c7b59dd9612d214fd435f2481b01f5c0371f3b3e133615262f4f8a59ab167aa2b676a5e880bbeb2f
-
SSDEEP
3072:u5jsqhH3yIP7UuIfmojPdDa1Ns+ng92As4DyTpyCRJvV3EacJfzlW:GYy3yLfjdcnxkysyhOfA
Behavioral task
behavioral1
Sample
57f2464aa7cd73a85e2c36d3cd4146627bc5544b86efef4b29a8f3bf6725f395.exe
Resource
win7-20240729-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
57f2464aa7cd73a85e2c36d3cd4146627bc5544b86efef4b29a8f3bf6725f395
-
Size
173KB
-
MD5
e1b3afd58ac96bf02fa4ca7c20b3ec56
-
SHA1
b8dedf53d0f3a712d8293f0edf125a7c19049247
-
SHA256
57f2464aa7cd73a85e2c36d3cd4146627bc5544b86efef4b29a8f3bf6725f395
-
SHA512
a52f947b1caac3cbb9abce75e650e1668010e8dcfbb237e8c7b59dd9612d214fd435f2481b01f5c0371f3b3e133615262f4f8a59ab167aa2b676a5e880bbeb2f
-
SSDEEP
3072:u5jsqhH3yIP7UuIfmojPdDa1Ns+ng92As4DyTpyCRJvV3EacJfzlW:GYy3yLfjdcnxkysyhOfA
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
Disables RegEdit via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7