General
-
Target
fb6a3dc22853445899cdfadc8316cc2a208c608a5cfd0bbb708de0536a77cb67N.exe
-
Size
396KB
-
Sample
241216-l21r4avrd1
-
MD5
93e540d2b394da384859ec144c53b1c0
-
SHA1
62f7b1e6322030ba4be88e9510254ea998872ccb
-
SHA256
fb6a3dc22853445899cdfadc8316cc2a208c608a5cfd0bbb708de0536a77cb67
-
SHA512
6faae6c6b892b2a23e5115f783fd5cbc6edcf70280cb7b14ccdb73ee9a705efa08f59b8d08b40927002e3f99e41b35c42e75766d0f5acaa6299c8e91d7e6d573
-
SSDEEP
6144:tRW2qsuvMbvN2/W9XDZ8rylncZVZLU3vKaxOeB59oxn1R93Lr2BBMWoQQ:tRW2q5vMjN2/WhDuD/Z4CaUO6THONoQQ
Static task
static1
Behavioral task
behavioral1
Sample
fb6a3dc22853445899cdfadc8316cc2a208c608a5cfd0bbb708de0536a77cb67N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
fb6a3dc22853445899cdfadc8316cc2a208c608a5cfd0bbb708de0536a77cb67N.exe
-
Size
396KB
-
MD5
93e540d2b394da384859ec144c53b1c0
-
SHA1
62f7b1e6322030ba4be88e9510254ea998872ccb
-
SHA256
fb6a3dc22853445899cdfadc8316cc2a208c608a5cfd0bbb708de0536a77cb67
-
SHA512
6faae6c6b892b2a23e5115f783fd5cbc6edcf70280cb7b14ccdb73ee9a705efa08f59b8d08b40927002e3f99e41b35c42e75766d0f5acaa6299c8e91d7e6d573
-
SSDEEP
6144:tRW2qsuvMbvN2/W9XDZ8rylncZVZLU3vKaxOeB59oxn1R93Lr2BBMWoQQ:tRW2q5vMjN2/WhDuD/Z4CaUO6THONoQQ
-
Modifies firewall policy service
-
Modifies security service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7