General
-
Target
4cb2032ca9e2a32a89c95558a4bec6fe02117c1a16790d7faea35ab765392f64N.exe
-
Size
636KB
-
Sample
241207-ypkxbs1je1
-
MD5
aad6e17fc6ab888f939189b1965875c0
-
SHA1
e4bbbb0f8d6f82e2f9c37d9b3d523d8c219e675d
-
SHA256
4cb2032ca9e2a32a89c95558a4bec6fe02117c1a16790d7faea35ab765392f64
-
SHA512
31a2d0c0b88f2fef9b6aad2171498623a8d370793819223baea7749c3e07982717bca6546d3208a89b6ab0cf2488c2ba3a16ec9a873b05a3a4cf8ef1ad0e0539
-
SSDEEP
12288:AtpvoLeovtFUD5jaAwxpv0wVrfMSKuudo:Atpvod1FUDZh0pv0sDKuO
Static task
static1
Behavioral task
behavioral1
Sample
4cb2032ca9e2a32a89c95558a4bec6fe02117c1a16790d7faea35ab765392f64N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
4cb2032ca9e2a32a89c95558a4bec6fe02117c1a16790d7faea35ab765392f64N.exe
-
Size
636KB
-
MD5
aad6e17fc6ab888f939189b1965875c0
-
SHA1
e4bbbb0f8d6f82e2f9c37d9b3d523d8c219e675d
-
SHA256
4cb2032ca9e2a32a89c95558a4bec6fe02117c1a16790d7faea35ab765392f64
-
SHA512
31a2d0c0b88f2fef9b6aad2171498623a8d370793819223baea7749c3e07982717bca6546d3208a89b6ab0cf2488c2ba3a16ec9a873b05a3a4cf8ef1ad0e0539
-
SSDEEP
12288:AtpvoLeovtFUD5jaAwxpv0wVrfMSKuudo:Atpvod1FUDZh0pv0sDKuO
-
Modifies firewall policy service
-
Sality family
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8