General
-
Target
e1f15bcc8dcc4deb98c900e94b3b05e18fc91a3575c006aa46e157ec2e921e92.exe
-
Size
1.6MB
-
Sample
241231-tas7yazmfr
-
MD5
eec2e9d94ba4eb58ff61c47b35114920
-
SHA1
4f02e6786c5512fac6534bebad67af6ad0f74b93
-
SHA256
e1f15bcc8dcc4deb98c900e94b3b05e18fc91a3575c006aa46e157ec2e921e92
-
SHA512
2db66eb69503dcfb552488e35fc4a549f624d65d6548e4eadf92fb946b2b0d6a537b686090e4d587a5d932764e1f257bd95e4a739e98163851c04f8e0f09885b
-
SSDEEP
49152:3PTlJDWxFp4ooqVbpKCnCO27fGp7wbnW3f:3pJqNoqjYBGYW3f
Static task
static1
Behavioral task
behavioral1
Sample
e1f15bcc8dcc4deb98c900e94b3b05e18fc91a3575c006aa46e157ec2e921e92.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e1f15bcc8dcc4deb98c900e94b3b05e18fc91a3575c006aa46e157ec2e921e92.exe
-
Size
1.6MB
-
MD5
eec2e9d94ba4eb58ff61c47b35114920
-
SHA1
4f02e6786c5512fac6534bebad67af6ad0f74b93
-
SHA256
e1f15bcc8dcc4deb98c900e94b3b05e18fc91a3575c006aa46e157ec2e921e92
-
SHA512
2db66eb69503dcfb552488e35fc4a549f624d65d6548e4eadf92fb946b2b0d6a537b686090e4d587a5d932764e1f257bd95e4a739e98163851c04f8e0f09885b
-
SSDEEP
49152:3PTlJDWxFp4ooqVbpKCnCO27fGp7wbnW3f:3pJqNoqjYBGYW3f
-
Modifies firewall policy service
-
Sality family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2