General
-
Target
e90d50b767df3ffc3113e0ea15d0128c9b81e7d2ff0e33d834b7d0539dd7ca02N.exe
-
Size
1012KB
-
Sample
241225-3cft3a1phk
-
MD5
3c8349453436e1bb2383d81edf04c550
-
SHA1
3da06cb3376b1721e4d875c10f5a6953662abcf0
-
SHA256
e90d50b767df3ffc3113e0ea15d0128c9b81e7d2ff0e33d834b7d0539dd7ca02
-
SHA512
59f49b92a3cd5fb3abe683c6c19747d2c7986469caafc266f81b409e8a12975df59c3db2787acebd35d626fdc0d3c8a82d16527679abfceea7ca780a44d411f1
-
SSDEEP
12288:k1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0INK4h1oWxJpcEi0/3IWV//7cSd8HR4bm:k1/aGLDCM4D8ayGM0R3o8/oAuylKi+t
Static task
static1
Behavioral task
behavioral1
Sample
e90d50b767df3ffc3113e0ea15d0128c9b81e7d2ff0e33d834b7d0539dd7ca02N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e90d50b767df3ffc3113e0ea15d0128c9b81e7d2ff0e33d834b7d0539dd7ca02N.exe
-
Size
1012KB
-
MD5
3c8349453436e1bb2383d81edf04c550
-
SHA1
3da06cb3376b1721e4d875c10f5a6953662abcf0
-
SHA256
e90d50b767df3ffc3113e0ea15d0128c9b81e7d2ff0e33d834b7d0539dd7ca02
-
SHA512
59f49b92a3cd5fb3abe683c6c19747d2c7986469caafc266f81b409e8a12975df59c3db2787acebd35d626fdc0d3c8a82d16527679abfceea7ca780a44d411f1
-
SSDEEP
12288:k1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0INK4h1oWxJpcEi0/3IWV//7cSd8HR4bm:k1/aGLDCM4D8ayGM0R3o8/oAuylKi+t
-
Modifies firewall policy service
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6