General
-
Target
f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39
-
Size
14.8MB
-
Sample
241226-t91q3a1mhq
-
MD5
8be5ce8cea8d9f24f569bd47765de87f
-
SHA1
a3969d04faa5d186a530283329071a375c83ab97
-
SHA256
f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39
-
SHA512
ee282e2c93a8a48c1a85281077d0be9903baa1a62bf15902b0a25af46f9d4973ff4b9ada212f8dc8fd0faa589221401a8138d3892e1b44b97d28516404a04113
-
SSDEEP
196608:fgA3UoPtKLBSIkMmf5XPmImn/2gpi08QukGZl9lEL38NlxgjewYk1jrMX+5j6txt:YAkolIBShMwu+2ukmoKlxgjewXmxD35v
Behavioral task
behavioral1
Sample
f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39
-
Size
14.8MB
-
MD5
8be5ce8cea8d9f24f569bd47765de87f
-
SHA1
a3969d04faa5d186a530283329071a375c83ab97
-
SHA256
f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39
-
SHA512
ee282e2c93a8a48c1a85281077d0be9903baa1a62bf15902b0a25af46f9d4973ff4b9ada212f8dc8fd0faa589221401a8138d3892e1b44b97d28516404a04113
-
SSDEEP
196608:fgA3UoPtKLBSIkMmf5XPmImn/2gpi08QukGZl9lEL38NlxgjewYk1jrMX+5j6txt:YAkolIBShMwu+2ukmoKlxgjewXmxD35v
-
Modifies firewall policy service
-
Sality family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
1