General
-
Target
dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b
-
Size
1.8MB
-
Sample
250107-k9zz4awpgp
-
MD5
c17115f4df684c8f589c55b6145dea51
-
SHA1
983753c8ccfd52ad49883347c2beb9c058d3b83f
-
SHA256
dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b
-
SHA512
12f276d17d25165c94780d5238f15fc70a350801c5f55a726ecc4d121f0819ebe0dae66c6f82a4fd818242e994536ad1fba4992bf4a35cc8904482a3b9bcb311
-
SSDEEP
49152:J5yqxOz7oqGsL4Oc+jUuKr3CTQF7Gwpi0dim:J9xOPXGE4qUuCCT+frgm
Static task
static1
Behavioral task
behavioral1
Sample
dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b
-
Size
1.8MB
-
MD5
c17115f4df684c8f589c55b6145dea51
-
SHA1
983753c8ccfd52ad49883347c2beb9c058d3b83f
-
SHA256
dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b
-
SHA512
12f276d17d25165c94780d5238f15fc70a350801c5f55a726ecc4d121f0819ebe0dae66c6f82a4fd818242e994536ad1fba4992bf4a35cc8904482a3b9bcb311
-
SSDEEP
49152:J5yqxOz7oqGsL4Oc+jUuKr3CTQF7Gwpi0dim:J9xOPXGE4qUuCCT+frgm
-
Modifies firewall policy service
-
Sality family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2