Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 12:41

General

  • Target

    38c3678efc7c2812048649ce51fc9dbb54f194a058babd61f31bd201e2bb3c9b.exe

  • Size

    269KB

  • MD5

    fe4a77dea4f499ed281b2db78f72d817

  • SHA1

    8d8cf0203ee3a32762a0eab0364cac18c81fbc2c

  • SHA256

    38c3678efc7c2812048649ce51fc9dbb54f194a058babd61f31bd201e2bb3c9b

  • SHA512

    cfb915d1629e0e0f6df412464cc18d91567ec37d37ad7c40d5ffc1d11d68624f1c02fee01e7b91b0669796d4869e10346c3a8f1ab4f7ba63914b0a9ee69b9153

  • SSDEEP

    3072:piHrfzY5c6X/YgW4l/DReos0gXf+EvC6C36eCWdMuoB+hyTJqM2Z1lHKYrNvnkid:plA2l/DRfkTC3dM7B+mCuqL2PKrx0E

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Signatures

  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • Sality family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\38c3678efc7c2812048649ce51fc9dbb54f194a058babd61f31bd201e2bb3c9b.exe
    "C:\Users\Admin\AppData\Local\Temp\38c3678efc7c2812048649ce51fc9dbb54f194a058babd61f31bd201e2bb3c9b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1556-0-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1556-2-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1556-3-0x0000000001D70000-0x0000000002E2A000-memory.dmp

    Filesize

    16.7MB