Overview
overview
10Static
static
1050cbb85b16...e6.exe
windows7-x64
1050cbb85b16...e6.exe
windows10-2004-x64
10$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$R9/uihost32.exe
windows7-x64
10$R9/uihost32.exe
windows10-2004-x64
10$R9/uihost64.exe
windows7-x64
10$R9/uihost64.exe
windows10-2004-x64
10General
-
Target
JaffaCakes118_2bfe501031c14858507f0cc09a4312ca438b521f16fa83e90f93b067a929aaab
-
Size
2.3MB
-
Sample
241224-p9vslaykal
-
MD5
96014ea85879d69a69d9ffc95f918b03
-
SHA1
8a076762e395344c901f6ba2d63b3c98cb3f5824
-
SHA256
2bfe501031c14858507f0cc09a4312ca438b521f16fa83e90f93b067a929aaab
-
SHA512
f91a1a59c77b325260644c6f7047411abce9a77bfcc9ab72b7e9f1d8c0a094482e8fbfe952606f3692fa8d13b840a77cc5c94b75e5bb444043307ed7f01ef63a
-
SSDEEP
49152:ab5FlP3+oJ5dfwnkKsmXfIPG7Z1h/EkXmCoI4YJgIFOTYWLknmeBz5+SAAxPja:83lP3VYnZPXf0G7LhMUmCZb0/4nmedI3
Behavioral task
behavioral1
Sample
50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$R9/uihost32.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$R9/uihost32.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$R9/uihost64.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6
-
Size
2.3MB
-
MD5
921379bd587ab29da4dc23fb9d47fe36
-
SHA1
e9db1731731503a81a2fdc67ffa005e6aa2a8038
-
SHA256
50cbb85b16d25f9f3edb0c8749932e27db306559546e1feb5effcd7b6aab07e6
-
SHA512
90211127d4dd83619bf42a1ab1f5d78d1a9f8ab7767704b19432d681807b636cf2bfbeb5ae97e25b57071e2a04f3b13e5a3f28b69d392b94f7ac0b3015ff38fc
-
SSDEEP
49152:dtSuw/yQBQIlFZ4n5gcdRVGTZYf0hrSkW6OoXWr0u3r8t9V808b:hnID2n5pViC8hrRW9X78tjIb
-
Modifies firewall policy service
-
Sality family
-
Indicator Removal: Network Share Connection Removal
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
$PLUGINSDIR/inetc.dll
-
Size
21KB
-
MD5
d7a3fa6a6c738b4a3c40d5602af20b08
-
SHA1
34fc75d97f640609cb6cadb001da2cb2c0b3538a
-
SHA256
67eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
-
SHA512
75cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
SSDEEP
384:oW4gLK82JvtosNCPhXKJ18hcEP1+f+pvMPbkdTg1Zahzs60Ac9khYLMkIX0+Gbyk:oW4i/2JloB5IQ9AhkwZaKRu
Score3/10 -
-
-
Target
$R9/uihost32.exe
-
Size
3.3MB
-
MD5
4fca837855b3bced7559889adb41c4b7
-
SHA1
04efbfdfc154938b8b60ace4c2d75fae0afd788a
-
SHA256
8a366b1d30dd4d03ad8c5c18d0fb978d00d16f5f465bd59db6e09b034775c3ec
-
SHA512
9b9b5ce67d46acb33d800095c2dbd8e64c82612653c15053f099c06e6ef1f5ed3c1f2232e3608259fd406f1ac86f500f157a46ec15946de70407bab5554e92f9
-
SSDEEP
98304:JeMVCZJfIiM9zP7GAzjATtDJC0hNHY3RM:hCZfqzP7GAzjATtDJFN43m
-
Xmrig family
-
XMRig Miner payload
-
-
-
Target
$R9/uihost64.exe
-
Size
2.8MB
-
MD5
0211073feb4ba88254f40a2e6611fcef
-
SHA1
3ce5aeeac3a1586d291552f541b5e6508f8b7cea
-
SHA256
62dfe27768e6293eb9218ba22a3acb528df71e4cc4625b95726cd421b716f983
-
SHA512
6ce06a15c5aa0fd78e01e5a2ef0507c1eba8bfe61ca5fc8d20526cb26f029f730f0ea1c34ce56c3f5db43aff1c2b05aa548b9514b17001c61d2a46660ee11fe7
-
SSDEEP
49152:Bd/KnFvJzZNhDYoYYYYoMYYYYYYjiYiYiEJzdJzrBR/Ut7sIul5+0SVRwq9/32xq:MJzZNhDYoYYYYoMYYYYYYjiYiYiEJzde
-
Xmrig family
-
XMRig Miner payload
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
1Network Share Connection Removal
1Modify Registry
6