General
-
Target
56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bdN.exe
-
Size
1.8MB
-
Sample
241217-a5dk7awldq
-
MD5
fd21acd09d1d06345672d9dc7564b2d0
-
SHA1
a3bdfa50f61c3bee187f741336e3908a609c9e00
-
SHA256
56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bd
-
SHA512
28361e8bd30e25dd50190b35b7489caeb280e39cdc18bcf447bae7002e0dc08d5a3222b18be19a9c6f335bbe8cfb41fcd08506f7883ed33f016395cfed386618
-
SSDEEP
49152:sbTC9RxKCnFnQXBbrtgb/iQvu0UHOaYmLCm:s6zxvWbrtUTrUHO2h
Static task
static1
Behavioral task
behavioral1
Sample
56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bdN.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bdN.exe
-
Size
1.8MB
-
MD5
fd21acd09d1d06345672d9dc7564b2d0
-
SHA1
a3bdfa50f61c3bee187f741336e3908a609c9e00
-
SHA256
56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bd
-
SHA512
28361e8bd30e25dd50190b35b7489caeb280e39cdc18bcf447bae7002e0dc08d5a3222b18be19a9c6f335bbe8cfb41fcd08506f7883ed33f016395cfed386618
-
SSDEEP
49152:sbTC9RxKCnFnQXBbrtgb/iQvu0UHOaYmLCm:s6zxvWbrtUTrUHO2h
-
Modifies firewall policy service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6