Analysis

  • max time kernel
    94s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 23:28

General

  • Target

    7985ee29990633eae8fc0675cea16944d5a01a7ee70f13f6dff4a8855e7d0453.exe

  • Size

    1.9MB

  • MD5

    c13bd0ed2758b4493fcdd3c726b141ad

  • SHA1

    44fc639689ca8f76b8ede0e4ab47d94d23facbb6

  • SHA256

    7985ee29990633eae8fc0675cea16944d5a01a7ee70f13f6dff4a8855e7d0453

  • SHA512

    a1029f4268a847afc7086f43ee58b74a96ad049d8a185a51cad324580f7ae26b9b6b28f47ef2c2f1c5aa9d0bb8f23147a8fb23d03c0a76af0c1d7ccb7e1e68f2

  • SSDEEP

    24576:w8h4aPlfTUYDrQOfseBC1+ZnoBzEgY5cfPtQE3WV9UKk0mKiKSqSWLaPgIze7m2P:w1U9T8ZDYWntr3WVar4I3VGiAwOf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7985ee29990633eae8fc0675cea16944d5a01a7ee70f13f6dff4a8855e7d0453.exe
    "C:\Users\Admin\AppData\Local\Temp\7985ee29990633eae8fc0675cea16944d5a01a7ee70f13f6dff4a8855e7d0453.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1844-0-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/1844-1-0x00000000024B0000-0x000000000353E000-memory.dmp

    Filesize

    16.6MB

  • memory/1844-2-0x0000000000400000-0x00000000005DE000-memory.dmp

    Filesize

    1.9MB

  • memory/1844-3-0x00000000024B0000-0x000000000353E000-memory.dmp

    Filesize

    16.6MB