Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 23:47
Behavioral task
behavioral1
Sample
d3f45efe5d1be698eca644b6ee96fb4dfeec5f37b8c38d737681d64442b03d28.exe
Resource
win7-20241023-en
General
-
Target
d3f45efe5d1be698eca644b6ee96fb4dfeec5f37b8c38d737681d64442b03d28.exe
-
Size
730KB
-
MD5
dc63107111bcb977b76fd2dc10d9cf7f
-
SHA1
084d1e5b27551a382d7d71a5083e41749fcb93d8
-
SHA256
d3f45efe5d1be698eca644b6ee96fb4dfeec5f37b8c38d737681d64442b03d28
-
SHA512
ca7313225d5db61973c2452eb629e1dd483849179ff9dfe1dfe0da669f09033e3507d6c7c3117144d748603ac48bdad825140e491b528de7d60c5bf6f8704e04
-
SSDEEP
12288:8JNMif+Y8uOLz9/C29bU/sFiWZanNGbf/ZRLQ24tSv2MJ9hVu7n2kBHvknGCkRRg:aNMiGRuOLz98/cZan4D/ZtQ7tNg9hVu8
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Sality family
-
resource yara_rule behavioral1/memory/2324-0-0x0000000000400000-0x0000000000593000-memory.dmp upx behavioral1/memory/2324-3-0x0000000000400000-0x0000000000593000-memory.dmp upx behavioral1/memory/2324-4-0x0000000001E90000-0x0000000002F4A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3f45efe5d1be698eca644b6ee96fb4dfeec5f37b8c38d737681d64442b03d28.exe