General
-
Target
36b97f6ce82a5f4ba5d389436fdec57e448211533e5063b44cff951cd1e64593N.exe
-
Size
728KB
-
Sample
241216-e966hsvkbv
-
MD5
babf6025fc442ed284dc59a556a38e10
-
SHA1
383bd7eb174ca47c13fb86214ba0aec33ee5d11e
-
SHA256
36b97f6ce82a5f4ba5d389436fdec57e448211533e5063b44cff951cd1e64593
-
SHA512
823c2fb6446edb1df3a765cdee8fbc2bdd32dc273ec0d6b9a69f48dc83ead46269293c30f6be7dad2cff170c4931c4267c03e62641bd75213a19f55cc37b06c8
-
SSDEEP
12288:TTyjXW+48qWywrU4kGFezOAVuJ5PI9ww7F5DO3HYffw4q4:PIXW/8yw1ez54lIdF5SXYHw4q4
Static task
static1
Behavioral task
behavioral1
Sample
36b97f6ce82a5f4ba5d389436fdec57e448211533e5063b44cff951cd1e64593N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
36b97f6ce82a5f4ba5d389436fdec57e448211533e5063b44cff951cd1e64593N.exe
-
Size
728KB
-
MD5
babf6025fc442ed284dc59a556a38e10
-
SHA1
383bd7eb174ca47c13fb86214ba0aec33ee5d11e
-
SHA256
36b97f6ce82a5f4ba5d389436fdec57e448211533e5063b44cff951cd1e64593
-
SHA512
823c2fb6446edb1df3a765cdee8fbc2bdd32dc273ec0d6b9a69f48dc83ead46269293c30f6be7dad2cff170c4931c4267c03e62641bd75213a19f55cc37b06c8
-
SSDEEP
12288:TTyjXW+48qWywrU4kGFezOAVuJ5PI9ww7F5DO3HYffw4q4:PIXW/8yw1ez54lIdF5SXYHw4q4
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
8