General
-
Target
f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66N.exe
-
Size
128KB
-
Sample
241231-xjjxeatnez
-
MD5
7aa1a3c26b81c67bcd15e6453d7e9ed0
-
SHA1
facec43ee5eccac060fdd434c7f1530621eb2f7e
-
SHA256
f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66
-
SHA512
d6e025886b43d5d203aa51d19bd20fc127d43bc7c35018639c9eaed47daeb26f360e6f51b8778b2c8ddd23754dcaea4a67b8cfc0c0152c81599281c0eaa1e8b4
-
SSDEEP
1536:1Jf83W8W60IL26Ap8iJ9+pvI8B8FuuKk1p0AxQjKP3xNL+vljZuIkBbmFZ3Oz+Ua:1JCD548iJK+cDm0KNxkllFFxOFdc
Static task
static1
Behavioral task
behavioral1
Sample
f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66N.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66N.exe
-
Size
128KB
-
MD5
7aa1a3c26b81c67bcd15e6453d7e9ed0
-
SHA1
facec43ee5eccac060fdd434c7f1530621eb2f7e
-
SHA256
f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66
-
SHA512
d6e025886b43d5d203aa51d19bd20fc127d43bc7c35018639c9eaed47daeb26f360e6f51b8778b2c8ddd23754dcaea4a67b8cfc0c0152c81599281c0eaa1e8b4
-
SSDEEP
1536:1Jf83W8W60IL26Ap8iJ9+pvI8B8FuuKk1p0AxQjKP3xNL+vljZuIkBbmFZ3Oz+Ua:1JCD548iJK+cDm0KNxkllFFxOFdc
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Sality family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7