General
-
Target
05de4be50013f11c1d05224466ffcab01903da18edae4968b2aa29af352186b1N.exe
-
Size
2.4MB
-
Sample
241230-wsfexaslgn
-
MD5
bb4c93e62962eca9f6583dee3fd19ac0
-
SHA1
e1f55779ada1fd5949d6ac48e267698948153879
-
SHA256
05de4be50013f11c1d05224466ffcab01903da18edae4968b2aa29af352186b1
-
SHA512
2e37d2bc9b452f789735ff7e983f34c29134907979079a990ed9b5af306247b415cb5309745f3c51c30702e0ca6eecea9621ffe9189463e242e635c24ec0e8da
-
SSDEEP
49152:Xt5PaRrhN8LJcs5jjjNjjTfWOOwa2TQQsWIW7hxPYPjv5BfRowRALCQpQfnY:95CRrwHjNfq9H2TRsoPuvvCwACPY
Static task
static1
Behavioral task
behavioral1
Sample
05de4be50013f11c1d05224466ffcab01903da18edae4968b2aa29af352186b1N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
05de4be50013f11c1d05224466ffcab01903da18edae4968b2aa29af352186b1N.exe
-
Size
2.4MB
-
MD5
bb4c93e62962eca9f6583dee3fd19ac0
-
SHA1
e1f55779ada1fd5949d6ac48e267698948153879
-
SHA256
05de4be50013f11c1d05224466ffcab01903da18edae4968b2aa29af352186b1
-
SHA512
2e37d2bc9b452f789735ff7e983f34c29134907979079a990ed9b5af306247b415cb5309745f3c51c30702e0ca6eecea9621ffe9189463e242e635c24ec0e8da
-
SSDEEP
49152:Xt5PaRrhN8LJcs5jjjNjjTfWOOwa2TQQsWIW7hxPYPjv5BfRowRALCQpQfnY:95CRrwHjNfq9H2TRsoPuvvCwACPY
-
Modifies firewall policy service
-
Sality family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2