General
-
Target
31bad58abba814e23a76419737b6a703410c21c9f7a524f8434a1499183f7988.exe
-
Size
3.1MB
-
Sample
250112-m12hnssjcp
-
MD5
006ef30d2ac76e74fe2977f5f16b0204
-
SHA1
9c279504158e9a33dee5aa6bdb752ec03431a7cc
-
SHA256
31bad58abba814e23a76419737b6a703410c21c9f7a524f8434a1499183f7988
-
SHA512
29bde2496283c867cda053ecc79f5a1f3e1e1463dd64d6976860d94c9d1235f905f237193c15b7066dd2971548e36943de88c2c0ee46e551a6c3a63db6c0631f
-
SSDEEP
49152:7crynO1MjEgjIsOzbrANo0ZQLkx5gNXcZ3BC/Uu+g4LeFTLTMQToPWAC:wr08vgjxOzgUkx0cPzLUHT7TLAC
Static task
static1
Behavioral task
behavioral1
Sample
31bad58abba814e23a76419737b6a703410c21c9f7a524f8434a1499183f7988.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Targets
-
-
Target
31bad58abba814e23a76419737b6a703410c21c9f7a524f8434a1499183f7988.exe
-
Size
3.1MB
-
MD5
006ef30d2ac76e74fe2977f5f16b0204
-
SHA1
9c279504158e9a33dee5aa6bdb752ec03431a7cc
-
SHA256
31bad58abba814e23a76419737b6a703410c21c9f7a524f8434a1499183f7988
-
SHA512
29bde2496283c867cda053ecc79f5a1f3e1e1463dd64d6976860d94c9d1235f905f237193c15b7066dd2971548e36943de88c2c0ee46e551a6c3a63db6c0631f
-
SSDEEP
49152:7crynO1MjEgjIsOzbrANo0ZQLkx5gNXcZ3BC/Uu+g4LeFTLTMQToPWAC:wr08vgjxOzgUkx0cPzLUHT7TLAC
-
Amadey family
-
Modifies firewall policy service
-
Sality family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Virtualization/Sandbox Evasion
2